Jp Morgan Chase Bank Information Security Attack

Improved Essays
ENTERPRISE SYSTEMS SECURITY INT7223

Research Paper On
Information Security - Current Event

Submitted by:
Sowmya Tiruchengode Yegyanarayanan
000717417
10/06/2014
INTRODUCTION
We are living in a delicate world filled with threat to sensitive information, materialistic properties and even to human soul that possess it. Information is considered to be a fragile asset of a person or an organization, which is capable of creating disastrous outcomes, if not secured. There are hackers and cyber criminals out there, waiting to break into the security vault (may be servers) of every vulnerable company possible to extract the most valuable “Data” called personal information or bank information which can fetch them bags and bags of ransoms. The image
…show more content…
The attack on JP Morgan Chase, which trades as Chase Bank, was originally identified in the month of July. This breach was officially first announced to the public during the month of August. But reports say that it is still under investigation by the bank and law enforcement. Its impact extended to the bulk of the bank’s customer base, affecting about 66% American households.
It has been confirmed according to scale of impact, as one of the largest security breach ever. Moreover, it came in an 8-K filing with the Securities and Exchange Commission (SEC), which revealed that the cyber criminals not only got away with the user information including names, addresses, email addresses and phone numbers, but also "internal JPMorgan Chase information". It is believed that the hackers used phishing scams and denial-of-service attacks to potentially obstruct their websites and internet activities. Moreover, the US government officials conceive that the hacking activities originate from
…show more content…
It may lead to loss of vital customer information, organizational data, along with the negative impact on brand reputation, customer loyalty and market share. Similarly, the hacker’s attack on JP Morgan Chase, which is a world recognized bank will definitely be massive. Even though there are no significant threats or malicious activities, post- hacking, the customer’s trust on the bank has definitely dropped at least by a substantial percentage. Ultimately, in the forthcoming days, this ought to impact the stock and market share of Chase

Related Documents

  • Superior Essays

    The first being the security of personally identifiable information. Now in this instance the company itself is not fully responsible for this release but they are indirectly responsible. The hackers are directly responsible for the dissemination of the users personal data but the company could have avoided this incident by shutting down but chose not to which directly constitutes a breach of privacy and security proposed by the company to protect the users information. The next issue is the release of users information that paid the company the fee of $19 to delete their information. The company decided not to delete the users information for some reason from their servers.…

    • 1516 Words
    • 7 Pages
    Superior Essays
  • Decent Essays

    Target Executive Summary

    • 343 Words
    • 2 Pages

    In December 2013, criminals forced their way into systems, gaining access to guest credit and debit card information. It was determined that certain guest information was also taken, for example, the information included names, mailing addresses, email addresses or phone numbers. The massive data breaches at Target were broken into the retailer's network using login credentials stolen from a heating, ventilation and air conditioning company. The hackers first tested the data-stealing malware on a small number of cash registers. The cost of the breach was far reaching to Target, customers, employees and banks.…

    • 343 Words
    • 2 Pages
    Decent Essays
  • Great Essays

    Target Executive Summary

    • 1564 Words
    • 7 Pages

    In 2013, in the days prior to Black Friday, hackers stole credit card information for millions of Target customers. The hackers set their traps and planned the data’s escape course. They uploaded exfiltration malware to move stolen credit card numbers. To cover their tracks, they first moved the stolen numbers to staging points spread around the United States. The information was then moved into the hackers’ computers in Russia.…

    • 1564 Words
    • 7 Pages
    Great Essays
  • Improved Essays

    associate screening, insider employee theft, and failure to update information security methods (Matwyshyn, 2009, p. 584). A breach incident is the unauthorized access to confidential or sensitive information which can result in the compromise or probable compromise of this data. This Information which could be confidential, protected, or sensitive can include personal identity information, health information, intellectual property or professional trade secrets of an organization, and financial data of the organization, customers or individuals. As the use of technology to collect, filter, process, and distribute data becomes more increased so do breaches. Data breaches are increasing among businesses and individuals with considerable financial…

    • 1058 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    The aim of this paper is to outline the dynamics of Walters Security. Walters Security’s main objective is to ensure a high level of network and information security for reach client. Customer and client information, payment information, personal files, bank account details- all this information cannot be fully restored once it has been lost or breached by criminals. The goal of this firm is developing an interdisciplinary research platform to develop a framework and provide benefits to eliminate breach-related vulnerability of information.…

    • 762 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    The continued spotlight on the scandal has made it difficult for Wells Fargo to regain consumer trust and has caused the organization continued difficulties on trying to continue growth. “The biggest fallout of the scandal for Wells Fargo was a sharp reduction in retail banking activity at the bank over subsequent quarters. The bank’s loan portfolio and deposit base have grown at a noticeably slower rate than its peers over the last two quarters, as the reputational hit resulted in existing and potential customers switching away from Wells Fargo’s services.” (Legal Issues Making It Hard For Wells Fargo To Regain Customer, Investor Confidence, 2017) Negative hits to a company's reputation can significantly reduce the credibility of the organization, and for one in the financial industry, being a credible merchant is imperative when seeking to improve…

    • 345 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    Macy's Research Paper

    • 141 Words
    • 1 Pages

    Data breach has been rising in the United States and in other countries as well, leaving customers vulnerable to identity theft. Customers also can get their credit history damaged. Thousands of people are affected by this situation more frequently when they make their purchases online as well as in the stores when using credit cards. Since the use of credit cards is the most convenient way to pay for a purchase for customers, scammers take advantage of it to commit their frauds.…

    • 141 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Hackers/Crooks have put hard working people in hardship by ruining their credit causing them to be unable to buy a home or even getting hired on at a job. They have been known to steal credit card numbers from websites, breaking into homes or digging into the trash to retrieve personal information, and an employee you work with that takes a look at your personal file(Federal Trade, National and State, Consumer Sentinel, 2013).Though the internet is one of the main ways identities are stolen, they will pick-pocket you, steal your mail right out of the box, your tax information, and even obtaining medical services(Cassim, 2015).…

    • 105 Words
    • 1 Pages
    Improved Essays
  • Improved Essays

    This articles lets people know that cybercrime is real and it could happen to anyone. According to a data breach tracker “Many Americans are in the first camp. According to a Gallup poll, 27% of Americans say their credit card information has been stolen in the past year, and 11% say their computer or smartphone has been hacked. And the rest are scared: Almost 70% of Americans worry that hackers will steal their credit card numbers from retailers, and 62% worry that hackers will target their personal devices” (Battensby, 2015). So what is to take from this?…

    • 397 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    It is important to know and identify when and how the breach occurred in order to accurately determine who was affected in the breach. Once the breach has been validated, the company needs to assign a manager who will handle the incident and have a response team ready in order to mitigate the problem. This team should handle all actions such as legal, IT, finance, risk management, and even media relations (Privacy Technical Assistance Center, 2012). If the authorities or law enforcement needs to be involved in the breach, then the team will determine whether they need to be contacted for further investigation. Once all the necessary information has been recovered, it is to determine whether the parties involved should be notified and what needs to be done in order to accommodate the persons involved, such as free credit report for a year.…

    • 796 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    Annotated Bibliography

    • 1797 Words
    • 8 Pages

    As seen with the case in which someone has to put a password to an Email account, confidentiality is a matter that is of great concern in many scenes of life . Cybersecurity is quite applicable as a tool that offers security when it comes to transfer of data though networks and between different people in one connection. For instance, cybersecurity is a tool used to ensure that the information shared among workers within an institution, through a connection of computers and computer systems, is not accessed by people who do not belong to this organization. In many cases, people will try to enter forcefully and access such confidential information without the consent of the organization. Cybersecurity helps such organizations in installing systems where access will be denied to non-members, and allowed to members since they make use of passwords and other security mechanisms installed within the computers and the connections .…

    • 1797 Words
    • 8 Pages
    Great Essays
  • Great Essays

    Jpmorgan Chase Case Study

    • 1518 Words
    • 7 Pages

    JPMorgan Chase is an American multinational bank and holding company. That provide the financial services to different sectors of the country. Headquarter of the bank in in New York City. This bank is the largest bank of United States that extends its operations in different cities of the state. By comparing its assets with the all the banks of the world, this ban ranks in 16th position.…

    • 1518 Words
    • 7 Pages
    Great Essays
  • Improved Essays

    I conclude that the overall results of the total data records breached means that if more than one organization has all our sensitive information such as our full names, social security numbers, date of birth, credit card numbers, and etc. then we are more likely have a higher risk of getting exposed more than once if the organization’s database is maliciously attacked. To continually increase awareness in data breach protection best practices will help Businesses and other organizations to lower the risk and minimize the impact of data breach in the future as technology continues…

    • 952 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    Left unaddressed, these breaches could devastate any organization. For instance, Yahoo recently reported that a security breach had allowed hackers to obtain the personal details of millions of users (Moritz & Womack, 2016). Investor panic was the result of this breach. The case of Yahoo underscores the need for organizations to dedicate all their efforts to securing their systems. Digital forensics investigation is one of the tools available to individuals and organizations which desire to secure their systems.…

    • 1252 Words
    • 6 Pages
    Superior Essays
  • Superior Essays

    Information security has arguably been around for centuries. Around the fifth century BC, the time of Herodotus, information was secured by shaving the head of a slave, tattooing a message, and before the slave was given orders to deliver the message, the hair was allowed to grow back, thus concealing the message and having rudimentary information security (Patterson, 2010). This ancient method of protecting information is highlighted to articulate information security methods are in need of constant revisions to protect information from new threats. According to Taluja and Dua (2012), information security methods are in need of constant revision to combat both new and upcoming threats. These new threats arise in different forms derived from…

    • 1096 Words
    • 5 Pages
    Superior Essays