Home Depot's Breach Case Study

Improved Essays
In the article I read, I learned that over a five month period, Home Depot’s payment terminals have been compromised. Home Depot’s breach was much bigger than the holiday attack at Target Corp (Sidel). Home Depot’s payment terminals have been under attack by hackers. Hackers, malicious computer users that find new ways to harass people defraud corporations, steal information, and maybe even destroy the economy (Strickland, 1). I believe not all hackers are here to inflict harm on others. Some ‘hackers’ are just regular individuals trying to improve any computer systems or explore the wonders of the technological world. But unfortunately, most hackers are here to mortify others and take advantage of them. The pre-Christmas 2013 attack at Target …show more content…
Apparently the breach didn’t affect any stores in Mexico or online customers. Home Depot stores have assessed the hacker breach and have provided a new, more secure form of payment, which provides enhanced encryption of payment data. With this new security system in motion, customer’s card data is fully protected and less vulnerable to hackers. This system jumbles up and locks all the card information making it impossible to read and copy, therefore being useless to the hackers.
The breach at Home Depot was first reported on September 2, 2014 by Bran Krebs (D’Innocenzio). It is said that Home Depot should have been more aware of the attacks happening due to the breach at Target last year (Perlroth). It is reported in The Houston Chronicle that banks, retailers, and card companies are trying to quickly adopt the microchip into credit and debit cards for a safer form of payment. When you swipe your card, the magnetic strip in the back provides your retailer with all your card and personal information, thus making it even easier for hackers to commit identity theft. With the new ‘micro-chip card’ anytime you swipe or insert your card into a payment terminal, your card produces
…show more content…
First, always make sure you always have a secure internet connection. Most times, it may say you have a good connection when you input all your card information, but as soon as you click ‘purchase’ you lose connection to the website. You then have to refresh the page to get back to where you were, and re-enter your card information. I believe this is one way hackers can get your information. Another way to prevent identity theft is by making sure the web page you’re purchasing an item from or putting your personal information on has a little lock symbol in the web search bar. This lets you know you’re on a secure and legit page that will protect all your information. Also do not make purchases from websites that advertise the ‘too good to be true’ specials. These websites are usually scams that make you enter your information and then say something like ‘sorry, this webpage is unavailable’ or something to that effect. Never make purchases from a site that you’ve never been on. Although everything may seem legit, it can be just a hacker’s website to trick you into putting all your information on the page. So after reading this article, I will definitely be more aware of my surroundings online, and pay attention to little details that could trigger suspicion. If I carefully review some of these tips, I should be in the clear from any hacker’s

Related Documents

  • Superior Essays

    Computers are a valuable tool, but they are not a filing cabinet. The opposition is not just a couple people in the U.S. however, nearly every American that owns a computer has at least some personal information stored in their non-trusty computers. We need to realize we do not possess the technology to keep these hackers out of our beeswax. The only way to stop our information from being stolen is to remove it from your computer, because once it is in there it is gone in a blink of an…

    • 1796 Words
    • 7 Pages
    Superior Essays
  • Improved Essays

    Cyber Bullying Prevention

    • 1054 Words
    • 5 Pages

    One way is to put any account made on instagram on private. This eliminates the risk of anonymous bullying. A person can choose who is allowed to follow them and no one can see any posts unless they are allowed by the owner of the account. Another way is to block and report any account that bullies. Blocking makes the person’s account who is being bullied like it is invisible.…

    • 1054 Words
    • 5 Pages
    Improved Essays
  • Superior Essays

    There is a government website named Cybercrime Laws of the United States that list all the laws. Some laws mentioned include laws that prohibit online identify theft, hacking, intrusion into computer systems, etc. Do these laws actually affect us? No, these laws only affect you unless you are a victim that has fallen into any of these situations. Although I do believe that it is important to know these laws in case anything can happen.…

    • 1245 Words
    • 5 Pages
    Superior Essays
  • Improved Essays

    Equipped with a location and telephone number one individual can do a lot of harm. In terms of online networking you truly need to be mindful of whom it is your corresponding with and you ought to never convey any individual data or photos. There are a couple of diverse steps you can use to verify none of your data is stolen, whether it is your machine getting hacked into due to poor security or whether it is a result of absence of attention to the dangers of online networking. Verify you have a decent encryption on your machine, upgrade your passwords routinely and never store them on your machine. I make it a propensity to never click the container that states to "spare your secret word" just in light of the fact that any individual who hacks in has prepared access to all your data.…

    • 808 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Computer Viruses Research

    • 2066 Words
    • 9 Pages

    The way to prevent phishing is not to open any spam mails unless you are hundred percent sure it is not a junk mail. Also, when you get an email on confirming any information, do not use the link in the email. Type it on Google and go to the official website and then confirm the information if…

    • 2066 Words
    • 9 Pages
    Improved Essays
  • Great Essays

    Desert Safari Essay

    • 1834 Words
    • 8 Pages

    Here are 3 good PC security habits you should develop and then practice regularly: 1. Lock your PC always when not in use. This is one habit that almost all users are aware of, but only a few practice. You should ensure that your desktop or laptop computer is not left unlocked and attended, even if you are using it a semi-private place, such as the office. Considering that you most probably log in to your computer as administrator, it would take just a few seconds for someone to install some form of spyware or malware that is designed to evade detection by popular antivirus software.…

    • 1834 Words
    • 8 Pages
    Great Essays
  • Improved Essays

    Schneier then goes on to say that even if people take precautions, internet surveillance is unavoidable. “We can limit what we search on Google from our iPhones, and instead use computer browsers that allow us to delete cookies. We can use an alias on Facebook. We can turn our cell phones off and spend cash. But increasingly, none of it matters” (56).…

    • 875 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Kerr (2016) is in favor of the FBI’s decision of keeping the website running where Yung (2016) offers a different approach. Even if the FBI needed to keep the website up he feels they should not of condoned or distributed pornographic images with actual children. He mentions; “The F.B.I. should have pursued its sting operations without child pornography distribution by utilizing alternatives such as virtual child pornography or by getting warrants based upon the identifying Internet information they could otherwise gather” (para. 6).…

    • 1758 Words
    • 8 Pages
    Improved Essays
  • Improved Essays

    The FBI operates so they can get whatever they need from a company, whether it 's an encryption key or any additional needed information, they fail to keep in mind that these demands will deteriorate a majority of these companies customer’s privacy. In addition, the FBI has seemingly been aware that any backdoor operating system created would not only operate for this particular suspect 's IPhone. Source D, states “ Once created(backdoor operating system), the technique could be used over and over again, on any number of devices.”this means that once he FBI obtains this new IOS system, they would not have to ask for it again in another situation similar to…

    • 1143 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Not only are they avoiding the probable cause part, but they are rummaging through everyone 's private lives without warrants. As stated in Text 1.2, Paragraph 13, “...police often do not need to show probable cause of a crime when the want to find out details about your life that they used to find in your home. Instead, they can get your private files from corporations that store your records on their computers.” This is completely absurd in the fact that in literally is said in the constitution that the government cannot search or seize any of the peoples documents without a warrant. Although second parties may claim that, since “.. the Supreme Court and other courts have issued a series of rulings declaring that the government does not need a search warrant to obtain personal documents if you have already shared them with someone else. (Text 1.2, Paragraph 10” What is the definition of shared though?…

    • 1138 Words
    • 5 Pages
    Improved Essays