Anti Malware Detection Software Recorded Malicious Activity On The Network

955 Words Nov 15th, 2016 4 Pages
Target received notification on November 30, 2013 from Bangalore, India that their anti-malware detection software recorded malicious activity on the network. However, Target did not respond until the United States Department of Justice contacted them in December 12, 2013, telling them of a possible data breach. When it was discovered that the malware was installed n the Point of Sales terminals, Target was not wise for not removing it immediately because it allowed the malware to gather more customer’s information, but by monitoring the activity of the malware Target was able to identify how it happened and making sure that the environment was safe and secure.
Some of the risks and benefits associated with taking an active defense strategy by monitoring the activity recorded by the malware before removing it is that it allowed for the forensic security team to investigate how the data breach happened and start the incident response plan. Furthermore, Teri Radichel (2014) argues "If you install a large, strong gate at the front of your property, but a hole exists in the back fence large enough for a thief to enter, the gate can easily be bypassed" (Radichel, 2014, p.7). Radichel (2014) demonstrates that Target left a huge vulnerability in their POS system, allowing an attack to occur. Furthermore, Target had the security system installed thinking it safe and secure, when in reality it was leaving data unencrypted leaving the hackers to notice a weak link in their system.…

Related Documents