Home Depot's Breach Case Study

Improved Essays
In the article I read, I learned that over a five month period, Home Depot’s payment terminals have been compromised. Home Depot’s breach was much bigger than the holiday attack at Target Corp (Sidel). Home Depot’s payment terminals have been under attack by hackers. Hackers, malicious computer users that find new ways to harass people defraud corporations, steal information, and maybe even destroy the economy (Strickland, 1). I believe not all hackers are here to inflict harm on others. Some ‘hackers’ are just regular individuals trying to improve any computer systems or explore the wonders of the technological world. But unfortunately, most hackers are here to mortify others and take advantage of them. The pre-Christmas 2013 attack at Target …show more content…
Apparently the breach didn’t affect any stores in Mexico or online customers. Home Depot stores have assessed the hacker breach and have provided a new, more secure form of payment, which provides enhanced encryption of payment data. With this new security system in motion, customer’s card data is fully protected and less vulnerable to hackers. This system jumbles up and locks all the card information making it impossible to read and copy, therefore being useless to the hackers.
The breach at Home Depot was first reported on September 2, 2014 by Bran Krebs (D’Innocenzio). It is said that Home Depot should have been more aware of the attacks happening due to the breach at Target last year (Perlroth). It is reported in The Houston Chronicle that banks, retailers, and card companies are trying to quickly adopt the microchip into credit and debit cards for a safer form of payment. When you swipe your card, the magnetic strip in the back provides your retailer with all your card and personal information, thus making it even easier for hackers to commit identity theft. With the new ‘micro-chip card’ anytime you swipe or insert your card into a payment terminal, your card produces
…show more content…
First, always make sure you always have a secure internet connection. Most times, it may say you have a good connection when you input all your card information, but as soon as you click ‘purchase’ you lose connection to the website. You then have to refresh the page to get back to where you were, and re-enter your card information. I believe this is one way hackers can get your information. Another way to prevent identity theft is by making sure the web page you’re purchasing an item from or putting your personal information on has a little lock symbol in the web search bar. This lets you know you’re on a secure and legit page that will protect all your information. Also do not make purchases from websites that advertise the ‘too good to be true’ specials. These websites are usually scams that make you enter your information and then say something like ‘sorry, this webpage is unavailable’ or something to that effect. Never make purchases from a site that you’ve never been on. Although everything may seem legit, it can be just a hacker’s website to trick you into putting all your information on the page. So after reading this article, I will definitely be more aware of my surroundings online, and pay attention to little details that could trigger suspicion. If I carefully review some of these tips, I should be in the clear from any hacker’s

Related Documents

  • Improved Essays

    Complete Name: Unit 4 Student Name: Donoho, Leslie ********************************************************************************************************** 1. Case Study: “Don’t Let Crooks Steal Your Identity: How to Protect Yourself-and Your Credit Rating” (p. 225) ********************************************************************************************************** 2. Provide several methods that crooks use to steal your identity. Student Answer: There are several ways that our identity can be stolen without our knowledge until we either start bouncing checks or recognizing charges that we never actually made (Kapoor, Dlabay, L, & Hughes, 2014). Thieves are lurking every where we turn hidden in plain sight.…

    • 1549 Words
    • 7 Pages
    Improved Essays
  • Superior Essays

    Lowe faces the same threat since Home Depot has a well-established market and is well known for the quality of products and services which increases the competition for the company (Danca,…

    • 1452 Words
    • 6 Pages
    Superior Essays
  • Decent Essays

    Chip Card Nightmares Published in Wall Street Journal, Joanna Stern’s “Chip Card Nightmares, Help Is on The Way” (a) Swipe the card (b) get scold by the cashier to use the chip reader (c) insert the chip and cancel all foreseeable plans (d) wait, wait some more and celebrate once you hear that joyless “ remove your card” sound. I want you to remember that next time you experience, it’s not you. It’s the banks, credit card companies, merchants, payment processors, terminal Manufacturers and many others But there’s a ray of hope; your Smartphone.…

    • 94 Words
    • 1 Pages
    Decent Essays
  • Great Essays

    The Equifax disaster points to a much bigger problem. -Rhetorical Analysis This is a rhetorical analysis of the article “The Equifax disaster points to a much bigger problem” written by Herbert Lin. Let us start with the writer himself; he is a senior research scholar for cyber policy and security at the Center for International Security and Cooperation (CISAC) and Hank J. Holland fellow in Cyber policy and Security at the Hoover Institution both of which are located at Stanford University.…

    • 1616 Words
    • 7 Pages
    Great Essays
  • Decent Essays

    Target Executive Summary

    • 343 Words
    • 2 Pages

    In December 2013, criminals forced their way into systems, gaining access to guest credit and debit card information. It was determined that certain guest information was also taken, for example, the information included names, mailing addresses, email addresses or phone numbers. The massive data breaches at Target were broken into the retailer's network using login credentials stolen from a heating, ventilation and air conditioning company. The hackers first tested the data-stealing malware on a small number of cash registers. The cost of the breach was far reaching to Target, customers, employees and banks.…

    • 343 Words
    • 2 Pages
    Decent Essays
  • Superior Essays

    As mentioned throughout the review, retail theft is an ongoing problem. With that in mind, it not only affects big business, it also fuels the very people set out to do harm to our nation. The organized retail crime operation must be disengaged and taken down. Otherwise, our nation will continue to face severe risks of terrorist attacks on our homeland.…

    • 973 Words
    • 4 Pages
    Superior Essays
  • Improved Essays

    Data breaches caused by illegal hacking at Target were in themselves tragedies and worrisome events; not only for the company, but for the customers in general who shop at the store locations nation-wide. However, considering various steps taken by Target upon realization of the breaches, it is hard to defend or picture exact wrongful doings or violation of laws by Target. Let’s keep in mind that electronic data and information breaches are hard to prevent; this is mostly due to interconnectivities of globally devices. As such, laws do not persecute companies for hackers breaking into their networks; instead, there are laws binding companies to put required secure methods and practices in place to mitigate hacking or data thefts; also, once a breach is noticed, laws require that such incident be reported immediately and those affected be notified. Here's what happened after; "Target alerted authorities and financial institutions immediately after we discovered and confirmed the unauthorized access, and we are putting our full resources behind these efforts.…

    • 567 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Repercussions Of Crimes

    • 1460 Words
    • 6 Pages

    This week’s readings introduced many aspects of crime that touch closer to home. Many students may be reading this same textbook, though I expect that we relate to these topics differently, some grasp our attention more and others, standing to be more significant to our lives and fears. This week we were introduced to the economic repercussions of crimes along with the fear of knowing that some serial murders are so cunning that they simply seem to disappear. The reason many types of physical crimes are more feared for some individuals is the simple fact that it takes work to earn the things they chose to purchase.…

    • 1460 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    Home Depot Fraud Essay

    • 1360 Words
    • 6 Pages

    November 6, 2014, Home Depot Inc., the world’s largest home improvement retailer was hacked by cybercriminals. Hackers gained access to Home Depot Inc., systems by stealing a password from a vendor. The hackers were able to breach Home Depot computer system and steal information for 56 million credit and debit card accounts and 53 million email address of customers. Although, the hackers had only access to the perimeter of Home Depot networks it was a vulnerability in Microsoft Windows which allowed them to fully breach the network. Moreover, the hackers were able to infiltrate the company’s point-of-sale system using high lever permissions, which allowed them to deploy malware on Home Depot self -check out system.…

    • 1360 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    Target Breach

    • 1769 Words
    • 8 Pages

    Most people can remember the Target breach, whether they were affected by it or not. Personally, this was the first big data breach that I remember, and I was one of the millions affected by it. While I do not shop at Target often of course I bought one thing from the store during the time of the breach. I was a nervous wreck, my wife was even worse. Luckily the only thing affected was our nerves and not our personal identities.…

    • 1769 Words
    • 8 Pages
    Improved Essays
  • Improved Essays

    Target Breach Case Study

    • 740 Words
    • 3 Pages

    Missed Alarms and 40 Million Stolen Credit Card Numbers: How Target Blew It 1. Who are the stakeholders in the Target breach? The main stakeholders are their shareholders, the clients that had their personal information stolen, and individuals with an ongoing connection with Target organization whose personal information was or might have been compromised. Stakeholders who are affected or worried that they might be harmed start to mistrust the firm and its complacent-sounding promises.…

    • 740 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    How SuccessfulIs Your Identity theft Protection? What is the ultimate effect of identity theft? If you become a sufferer of this white receiver criminal activity, your financial predicament are completely broken. It takes a lengthy time to recover from identity theft, especially if it took years before you learned about your regrettable situation. You should acquire the best id protection from theft because every responsible credit score holder should know how to avoid identity theft.…

    • 694 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    • Bricks and clicks (integrating high street and online presence) The presence of online and high street presence gives shoppers both options and means that some consumers are more confident in the fact that they can go to the shop to return items that they have bought online. Some individuals will be more trusting of a retailer that has a high street and online presence due to the fact that they have the option to visit the physical store and try before they buy with more expensive items and order smaller items…

    • 1208 Words
    • 5 Pages
    Decent Essays
  • Improved Essays

    What Has Technology Done to America Technology is improving every day. Making it easy to access different things on the Internet. Technology contains many private data bases that can be obtained through anybody. It also gives people access to do things, that shouldn’t be done. Technology has changed America in an unsatisfactory way.…

    • 687 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    How to do Laundry as a College Freshman You would think that classes are the most overwhelming thing for a college freshman. However, even though classes are difficult doing laundry is even more problematic. My entire life I had my parent do all my laundry, and I never even knew how to make my bed until college. After living such a privileged life, I was scared out of my mind to do laundry for the first time.…

    • 764 Words
    • 4 Pages
    Improved Essays