Security Breach Research Paper

Improved Essays
BEST PRACTICES WHEN BREACHES OCCUR
Security includes the “CIA triagle” of confidentiality, integrity, and availability. So, anyone making an effort to protect the security of data, and subsequently databases, should have a goal of protecting all three facets. According to Shon Harris, the confidentiality portion of security is defined as preventing unauthorized disclosure of sensitive information, integrity is preventing unauthorized modification of systems and data, and availability is preventing the disruption of service and productivity, ensuring that the data is not lost or stolen, remains intact and not tampered with, and is always available (2002). In an effort to promote these best practices, the Open Web Application Security Project
…show more content…
Therefore, additional steps should be prepared for how to handle a breach when it happens. First and foremost, when a company experiences a breach, it is their ethical duty to notify all individuals would could potentially be affected by the data breach. Some believe these notifications help prevent the problem as well since the very public announcements of money lost due to the breaches promotes expenditures on more responsible security measures (Rode, 2007). However, others still keep much information of the breach undisclosed. With recent breaches of Apple and Home Depot, neither company readily communicated with the public exactly what had happened, not admitting publicly what happened until after a thorough internal investigation in juxtaposition to Target quickly admitting its breach publicly in creeping increments (Kenealy, 2014). Many believe the public backlash Target received from their slow step by increasing step approach with their breach will lead others to wait longer to admit breaches until they know the full impact. The media response to Target’s “creeping candor” suggested Target was not as forthcoming as they would have liked the public to believe, only slowly admitting portions of the breach as became necessary (Kenealy, …show more content…
Even with the public becoming more aware and advances in security based technology, that number continues to rise as the number of breached businesses continues to rise yearly (Doshi & Trivedi, 2014). Target Corporation experienced a security breach in 2013, which occurred because a vendor gained access to the internal Target networks via the network connections available through the HVAC systems affecting more than 70 million customers (Gray & Ladig, 2015). Another notable breach, Adobe Systems, began in July 2013 and went undetected for two months costing the company untold amounts of money because their products’ source code was released on the Internet, while in Neiman Marcus’ case, the breach saw 350,000 of their customers’ credit cards stolen and fraudulently used (Silverman, 2016). Home Depot’s payment system was breached affecting customers that shopped at any of their 2200 stores, while Apple’s breach involved attackers hacking personal accounts to steal pictures from celebrity accounts (Kenealy, 2014). Other breaches include Nationwide Mutual Insurance, Zappos, Trustwave Holdings, PF Chang’s, and Linked In (Silverman, 2016). Many of these breaches have led to improvements in security as companies become more likely to put up the expense for better security but also as technology rises to meet specific issues. An example of this would be the

Related Documents

  • Improved Essays

    Nt1330 Unit 2

    • 369 Words
    • 2 Pages

    The business requirements of the access control must be established and documented. Access control rules and rights for each user or group of users should be clearly stated in a policy statement about access All employees, contractors and third party users of information systems and services should be required to record and report any allegations or findings of security weaknesses in the system or the services. This aims to ensure that information security events and weaknesses detection of information security can be dealt with in a timely and…

    • 369 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Target Breach Case Study

    • 675 Words
    • 3 Pages

    Our group decided to discuss the Target breach. This breach occurred in 2013 when they stated hackers broke into the retailer’s network using login credentials stolen from a heating, ventilation and air conditioning company that does work for Target at a number of locations. This company called Fazio had access rights to Target’s network for carrying out tasks like remotely monitoring energy consumption and temperatures at various stores. The attackers leveraged the access provided by the Fazio credentials to move around undetected on Target’s network and upload malware programs on the company’s point of sale systems. The hackers first tested the date-stealing malware on a small number of cash registers.…

    • 675 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Data breaches caused by illegal hacking at Target were in themselves tragedies and worrisome events; not only for the company, but for the customers in general who shop at the store locations nation-wide. However, considering various steps taken by Target upon realization of the breaches, it is hard to defend or picture exact wrongful doings or violation of laws by Target. Let’s keep in mind that electronic data and information breaches are hard to prevent; this is mostly due to interconnectivities of globally devices. As such, laws do not persecute companies for hackers breaking into their networks; instead, there are laws binding companies to put required secure methods and practices in place to mitigate hacking or data thefts; also, once a breach is noticed, laws require that such incident be reported immediately and those affected be notified. Here's what happened after; "Target alerted authorities and financial institutions immediately after we discovered and confirmed the unauthorized access, and we are putting our full resources behind these efforts.…

    • 567 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Target Security Breach

    • 181 Words
    • 1 Pages

    From a managerial perspective, there were many errors made in handling the December 2013 Target security breach. The first questionable decision for review deals with the effects of poor communication. Chief Executive Gregg Steinhafel hesitates to publicly communicate the breach to consumers (Kinicki & Williams, 2013). The primary law of business is “being responsive to customers” (Kinicki & Williams, 2013, p.12). Furthermore, when the details were communicated, CEO Steinhafel inflated the amount of affected shoppers (Kinicki & Williams, 2013).…

    • 181 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    IT security threats and cryptography 7/A. P1: Explain the different security threats that can affect the IT systems of originations. 7/A.M1: Assess the impact that IT security threats can have on organization's IT systems and business whilst taking account of the principles of information security and legal requirements In today's society data is a very valuable thing companies have to take in to account how to protect that data from the threats, Threats is a way in which the data is vulnerable and therefore rules and regulations have been put in place to stop these potential threats for example all will have adhere to the principles of information security this is a way in which data is protected, I have been working for a start-up company…

    • 1332 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    Target Breach

    • 1769 Words
    • 8 Pages

    Since then, it seems like data breaches happen every day. It is sad that I do not even remember the Anthem breach. It just blends in with all the others. Between November 27th and December 15th of 2013 Target experienced one of the largest cyber hacks in United States history (Clark, 2014).…

    • 1769 Words
    • 8 Pages
    Improved Essays
  • Improved Essays

    Technology has shaped many parts of our lifestyle’s from movement from one point to another (GPS), all the way to maintaining all of our hard earned funds on a piece of plastic. The question at hand is how this is all protected and who enforces it? Network security has proven beneficial in many cases in today’s society. It continuously monitors the companies system ensuring that unauthorized access isn’t permitted, or as we like to believe keeping our information from falling into the wrong hands.…

    • 397 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    In light of recent events, no high end corporation is above regulations and laws of the nation. Wells Fargo, a bank with the highest market valuation in America, has been charged with fraud. This company is worth of $250 million dollars, with customers across 35 countries, totaling 70 million people as global customers (CNN Money). Keeping people accountable for their actions is something that the government has been put in place for, and this is one of the times that they have not promptly caught the problem. Countless companies and corporations throughout the centuries have in some way tried to get away with breaking the law due to accounting fraud.…

    • 640 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Target Breach Case Study

    • 740 Words
    • 3 Pages

    Missed Alarms and 40 Million Stolen Credit Card Numbers: How Target Blew It 1. Who are the stakeholders in the Target breach? The main stakeholders are their shareholders, the clients that had their personal information stolen, and individuals with an ongoing connection with Target organization whose personal information was or might have been compromised. Stakeholders who are affected or worried that they might be harmed start to mistrust the firm and its complacent-sounding promises.…

    • 740 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Introduction According to http://searchsecurity.techtarget.com/definition/data-breach , “A data breach is an incident in which sensitive, protected or confidential data has potentially been viewed, stolen or used by an individual unauthorized to do so. Data breaches may involve personal health information (PHI), personally identifiable information (PII), trade secrets or intellectual property.” Many people experienced a data breach if they shopped in Target stores between November 27 and December 15, 2013. According to Washington Post, more than 70 million customers not only might have had their personal information compromised but also their card data stolen.…

    • 853 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    The first company is Heartland Payment Systems (HPS), this company hit the headlines in January of 2009 when they became victim to one of the largest data security beaches in U.S. history. Although the actual number of credit card details stolen has never been confirmed, it was said to be in the tens of millions. This was carried out over a four-month period when HPS was processing over one hundred million transactions per month. It is surprising to hear that only two weeks before this malware attack took place, HPS were audited and achieved accreditation of being PCI Compliant by their Qualified Security Assessor (QSA). (Hays, 2012).…

    • 519 Words
    • 3 Pages
    Decent Essays
  • Great Essays

    Security Threat Groups, also referred to as gangs are either an formal or informal group of prison inmates who set up either by race or by their beliefs. The evolution of gangs have developed a threat to the safety of prison officials and other inmates. Some of the major security threat groups include the Aryan Brotherhood, The Klu Klux Klan, The Folks, The Nation of Islam, and MS13. Groups within the correctional facilities are categorized as STGs depending upon parameters such as gang history, purpose, involvement in illegal activities, propensity for violence, and its structure and composition.…

    • 2127 Words
    • 9 Pages
    Great Essays
  • Great Essays

    Consumer Data Breach

    • 1523 Words
    • 7 Pages

    In 2010, a Ponemon Institute study found that 85 percent of American companies fell victim to an organizational data breach during 2009 (Zurich, 2010, p. 2). The Ponemon Institute findings illustrate a necessity for businesses to expect to be a target for nefarious actors who seek to procure sensitive customer data. In the assignment scenario, the retail store unwittingly became a member in the growing percentage of organizations faced with customer data breaches. In an attempt to dissect and analyze the retail store’s customer data breach, I will begin this essay with the legal obligations and repercussions that the company faces, both criminal and civil.…

    • 1523 Words
    • 7 Pages
    Great Essays
  • Improved Essays

    Cyber Breach Essay

    • 444 Words
    • 2 Pages

    Consider these eight common cyber breach costs. 1. Loss of Customers - A 2016 study found that 76 percent of consumers would stop doing business with a company that suffered repeated data breaches. 2. Business Disruption - Business process failure and lost employee productivity…

    • 444 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    I conclude that the overall results of the total data records breached means that if more than one organization has all our sensitive information such as our full names, social security numbers, date of birth, credit card numbers, and etc. then we are more likely have a higher risk of getting exposed more than once if the organization’s database is maliciously attacked. To continually increase awareness in data breach protection best practices will help Businesses and other organizations to lower the risk and minimize the impact of data breach in the future as technology continues…

    • 952 Words
    • 4 Pages
    Improved Essays