Security Fraud Case Study: Target's Security Breach

Decent Essays
The following case study is based on a company called Target, which experienced a security breach in 2013 (Aguilar, 2014). Hackers penetrated the Target’s system through their web server (Aguilar, 2014). The hack exposed 40 million credit card and debit card details such as CCV numbers, credit card numbers, etc. as a result, employees lost their jobs, and board members were threatened with retrenchment (Aguilar, 2014). After that 140 lawsuits followed (Aguilar, 2014). These were people who claimed that the organization did not properly protect their confidential information and that although the breach had occurred, the company did not make any means to inform them (Aguilar, 2014).
This section has touched on how the implementation of an improper

Related Documents

  • Decent Essays

    RELATED CASES: None SUPPORT DOCUMENTS: Eight Pages Bank Of America Fraud Affidavit/Transaction History. On 12/09/2015, Sandra Agrait contacted the Pasco Sheriff`s Office by telephone to report fraudulent use of her Bank Of America ATM/Debit Card ending in 5457. Ms. Agrait advised she reviewed her bank account transaction history and observed two unauthorized cash withdrawals that she did not make. She said her houseguest, Timothy Midkiss took her debit card out of her wallet, used it to make the cash withdrawals and returned it to her walle without her knowledge or permission.…

    • 206 Words
    • 1 Pages
    Decent Essays
  • Superior Essays

    The first being the security of personally identifiable information. Now in this instance the company itself is not fully responsible for this release but they are indirectly responsible. The hackers are directly responsible for the dissemination of the users personal data but the company could have avoided this incident by shutting down but chose not to which directly constitutes a breach of privacy and security proposed by the company to protect the users information. The next issue is the release of users information that paid the company the fee of $19 to delete their information. The company decided not to delete the users information for some reason from their servers.…

    • 1516 Words
    • 7 Pages
    Superior Essays
  • Improved Essays

    Hrm/531 Week 2

    • 636 Words
    • 3 Pages

    Every business is required by law to have some form of security policy in place that will protect their customer’s information. How robust these policies are, may, and do, differ from company to company and can depend on many different factors unique to each individual business. Information security is very important and at my widget company it would be my responsibility and ethical duty to do everything in my power to find out how my system was breached and exactly what customers information was compromised as well as who is responsible for taking this information. I would also be ethically responsible for finding out which employees have not been adhering to the company's security policy and accessing customer information when it was not part of their duties, and under what circumstances this happened. Where these employees instructed to do this or did the do it of their own accord and if so reprimand these individuals up to and including termination of their employment with my company.…

    • 636 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    HIPAA Privacy Case Summary

    • 1514 Words
    • 7 Pages

    The first consumer value store (CVS) was founded in 1963 by two brothers Sidney Goldstein and Stanley and Ralph Hoagland as a partner. The store was first located in Lowell, Massachusetts and sold beauty and health supplies. In one year, the company had opened 17 stores. In 1967, the company started offering pharmaceuticals. Then ten years later the company engaged in expansion activities through acquisitions, mergers and store openings.…

    • 1514 Words
    • 7 Pages
    Superior Essays
  • Superior Essays

    Uber’s Data Breach: Legal and Ethical Issues Introduction In 2016, the tech company Uber suffered a data breach that compromised the personal data of 57 million Uber customers. Uber is a peer-to-peer ridesharing company that is headquartered in San Francisco, California. In the past five years, this company has had multiple instances, prior to the large data breach, where they did not secure their user’s data.…

    • 1284 Words
    • 6 Pages
    Superior Essays
  • Decent Essays

    Target Executive Summary

    • 343 Words
    • 2 Pages

    In December 2013, criminals forced their way into systems, gaining access to guest credit and debit card information. It was determined that certain guest information was also taken, for example, the information included names, mailing addresses, email addresses or phone numbers. The massive data breaches at Target were broken into the retailer's network using login credentials stolen from a heating, ventilation and air conditioning company. The hackers first tested the data-stealing malware on a small number of cash registers. The cost of the breach was far reaching to Target, customers, employees and banks.…

    • 343 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Data breaches caused by illegal hacking at Target were in themselves tragedies and worrisome events; not only for the company, but for the customers in general who shop at the store locations nation-wide. However, considering various steps taken by Target upon realization of the breaches, it is hard to defend or picture exact wrongful doings or violation of laws by Target. Let’s keep in mind that electronic data and information breaches are hard to prevent; this is mostly due to interconnectivities of globally devices. As such, laws do not persecute companies for hackers breaking into their networks; instead, there are laws binding companies to put required secure methods and practices in place to mitigate hacking or data thefts; also, once a breach is noticed, laws require that such incident be reported immediately and those affected be notified. Here's what happened after; "Target alerted authorities and financial institutions immediately after we discovered and confirmed the unauthorized access, and we are putting our full resources behind these efforts.…

    • 567 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    After reading the article what I summarize that Target's Database was hacked. The hackers used the information from the database to steal people’s information and money. This caused Target a problem between the customers and company. Target had to offer $10,000,000 to fix the issue, and paid each customer who were victims would receive up $10,000. This caused Target to close all the of their stores in Canada, and lay off about 34,000 employees.…

    • 180 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    IT security threats and cryptography 7/A. P1: Explain the different security threats that can affect the IT systems of originations. 7/A.M1: Assess the impact that IT security threats can have on organization's IT systems and business whilst taking account of the principles of information security and legal requirements In today's society data is a very valuable thing companies have to take in to account how to protect that data from the threats, Threats is a way in which the data is vulnerable and therefore rules and regulations have been put in place to stop these potential threats for example all will have adhere to the principles of information security this is a way in which data is protected, I have been working for a start-up company…

    • 1332 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    Target's Case Summary

    • 914 Words
    • 4 Pages

    1. There were numerous security and control weaknesses mentioned in this case. At first glance, Target had done everything they needed to do to prevent this hack from happening. They had a security staff of more than 300 people and spent over $1M for malware detection software. If anything looked suspicious, Target was to be notified immediately.…

    • 914 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Target Breach

    • 1769 Words
    • 8 Pages

    Most people can remember the Target breach, whether they were affected by it or not. Personally, this was the first big data breach that I remember, and I was one of the millions affected by it. While I do not shop at Target often of course I bought one thing from the store during the time of the breach. I was a nervous wreck, my wife was even worse. Luckily the only thing affected was our nerves and not our personal identities.…

    • 1769 Words
    • 8 Pages
    Improved Essays
  • Improved Essays

    Target Breach Case Study

    • 740 Words
    • 3 Pages

    Missed Alarms and 40 Million Stolen Credit Card Numbers: How Target Blew It 1. Who are the stakeholders in the Target breach? The main stakeholders are their shareholders, the clients that had their personal information stolen, and individuals with an ongoing connection with Target organization whose personal information was or might have been compromised. Stakeholders who are affected or worried that they might be harmed start to mistrust the firm and its complacent-sounding promises.…

    • 740 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    C. Common Causes of Data Breach The four common causes of data breaches includes the absence of policy, unencrypted dives, lack of security defenses and insider negligence [22]. Insider negligence of private information is one of the top reasons for a data breach. This includes an employee accident that leads to a data breach, and the use of a third-party that is negligent. For example, in 2009 an unencrypted laptop was stolen from the car of an Oregon Health & Science University employee which exposed the information of about 1,000 patients.…

    • 1541 Words
    • 6 Pages
    Great Essays
  • Decent Essays

    Target on Friday confirmed that strongly encrypted PIN data was removed from its system during the security breach that took place between Black Friday and Dec. 15. The breach could impact 40 million shoppers who used credit cards or debit cards at Target's U.S. stores during that period; however, online shoppers have not been affected. The incident has been gathering steam in the media. Along with consumers' growing voices of frustration and anger, attorneys general in several states have pledged to try to help their constituents whose credit card accounts were compromised to deal with the fallout. Sen. Richard Blumenthal (D., Conn.) has asked the Federal Trade Commission to immediately open an investigation into Target's security breach,…

    • 303 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    I conclude that the overall results of the total data records breached means that if more than one organization has all our sensitive information such as our full names, social security numbers, date of birth, credit card numbers, and etc. then we are more likely have a higher risk of getting exposed more than once if the organization’s database is maliciously attacked. To continually increase awareness in data breach protection best practices will help Businesses and other organizations to lower the risk and minimize the impact of data breach in the future as technology continues…

    • 952 Words
    • 4 Pages
    Improved Essays