Cyber Attack Case Study

Superior Essays
1a. Strategic planning to prevent and/or fight off cyber attacks

Preventing Cyber Attack-Identifying Top Risks

Strategic planning begins with the prevention or minimizing the attack to a business. Businesses are a value and because a business has value, there will always be a threat for business information, and this is what makes a business vulnerable.
Businesses need to be aware of what risks are available and how that information can be protected. Once the critical business information is identified, a planned response needs to be identified as to how to protect that information. The protection plan may begin with the Information Technology (IT) Department with software but essentially it is individual responsibility of how the information is kept safe. Information is always vulnerable and people are looking to find ways to gain access.
By having checks in place, if a hack does occur, the violation can be detected sooner and planning continues to prevent future attacks from happening again by devising a deflect plan, and how to go about defending in the future.
Firewalls are put in place to keep individuals from hacking into the database at the place of my employment. There are times when hacking still occurs. What is learned from the hacking, how the situation is handled, and new
…show more content…
I was involved in the Target cyber-attack. I was aware of the Target compromise but a few weeks had passed and everything appeared to be normal. It was three weeks after the compromise and, while I was not contacted by Target, I was notified by my bank that suspicious activity had taken place on my bank account. My bank reissued a new debit card with a new identification number and took care of the activity on my account. While I do not know what the activity was or the amount, I know my bank was paying attention to my accounts and continues that service today. That in itself gives me peace of

Related Documents

  • Decent Essays

    Implementing Firewall Filter Implementing firewall filters on a network makes the network free from attackers and very secured. Some of the boundaries that I will consider using on my firewall will be blocking ports on the network. First of all I will establish a new FTP session which the will initiate a connection to an FTP server that listens on TCP port 21 by default. This will help users on the network to login with user name and password before any data to port 21 will accepted. I will establish SSH(secure shell) which will provide a strong and secure communications over the network.…

    • 441 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Nt1330 Unit 2

    • 369 Words
    • 2 Pages

    Based on the findings obtained from the analysis of security information then compiled recommendations for improvement of the condition of the company. Some recommendations are: 1. Describe in detail the confidentiality agreement and specifically including maintaining the confidentiality of the password 2. Reexamination of the access rights of each and updating access rights in case of transfer of part or advancement in accordance with their respective access rights. 3.…

    • 369 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Ba501 Week 1 Assignment

    • 740 Words
    • 3 Pages

    BA501 Overview of Business Intelligence Week 1 Assignment David Nagus Grantham University Professor Jackson May 6, 2015 I Introduction With any business with a database system there are bound to be changes and different metrics used in the decisions of running a business. These days almost all businesses have a computer system or network of computers that are interlinked. One aspect of a business is how they secure their network and who has access to data and who does not. On a almost daily basis businesses are being targeted with threats from outside sources to steal data, cause harm or disrupt the daily workings of a business and affecting people's lives.…

    • 740 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 9 Final Paper

    • 586 Words
    • 3 Pages

    Opening Statement Written policies provide a means of security within organization. It establishes the regulations that all faculty must adhere to in order to protect important company and client information. The organizational policies should be read by and signed by each employee as a consensus that all regulations will be followed once joining the organization. And, for those who are current employees, to keep abreast of any amendments made to current policy, so that all employees are in compliance. These policies should be kept in an accessible place for everyone to read, so no one will be left out of the loop.…

    • 586 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    Attack Timeline, Target’s Perspective Date 1: November 15, 2013 – Cybercriminals conduct attack on HVAC systems. Criminals penetrated Target’s point of sale network and installed malware on terminals. Date 2: November 27, 2013 (12 days after Date 1) – Cybercriminals begin stealing information from 40 million debit/credit cards from Target’s systems. *Last known attack from cyber criminals* Date 3: November 30, 2013 (15 days after Date 1) – Target acknowledges publicly that FireEye had been giving more alerts but local teams deemed that no action had to be taken against the alerts so Target did nothing. Date 4: December 13, 2013 (28 days after Date 1) – U.S. Department of Justice notifies Target executives about fraudulent debit/credit information connected to Target transactions.…

    • 591 Words
    • 3 Pages
    Great Essays
  • Decent Essays

    Target received red flags right before the actual attack. Due to common cyber crimes target was already aware of the threats that happen so they installed $1.6 million malware detection tool Fireeye. They also had a team of security specialists in Bangalore and Minneapolis who monitor its computers around the clock. Fire eye did its job and notified them on multiple occasions about the incident that’s going to happen; unfortunately security team appears to have made wrong call. "…

    • 332 Words
    • 2 Pages
    Decent Essays
  • Great Essays

    Escalation Policy Pathways Industries Policy Overview This policy provides guidelines for responding to misuse of Pathways Industries IT and network resources either from internal or external sources. This policy will attempt to provide contact information for reporting incidents and when to involve Pathways Industries Executive Team, and or company legal representatives. Attacks on Pathways Industries resources could be considered as theft of intellectual property or other computer network attack. All staff members will receive regular training on acceptable use and incident handling procedures of all Pathways Industries resources.…

    • 738 Words
    • 3 Pages
    Great Essays
  • Improved Essays

    Target Breach Case Study

    • 675 Words
    • 3 Pages

    Our group decided to discuss the Target breach. This breach occurred in 2013 when they stated hackers broke into the retailer’s network using login credentials stolen from a heating, ventilation and air conditioning company that does work for Target at a number of locations. This company called Fazio had access rights to Target’s network for carrying out tasks like remotely monitoring energy consumption and temperatures at various stores. The attackers leveraged the access provided by the Fazio credentials to move around undetected on Target’s network and upload malware programs on the company’s point of sale systems. The hackers first tested the date-stealing malware on a small number of cash registers.…

    • 675 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Cango Strategic Planning

    • 904 Words
    • 4 Pages

    The Strategic Planning The strategic planning is an inescapable phase of the launching of a project. Today leader in its market, CanGo can see itself ousted tomorrow. It leads to permanent changes from now on to adapt itself to the new economic rules. In this context, the strategic planning is an inescapable phase of the launching of their Gaming Online project. 1.…

    • 904 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Answer. Yes, Target story does indeed follow the general “ATP kill chain” attack model as clearly elaborated upon in the case study. Attackers started by performing“Reconnaissance”over one of Target’s external heating and ventilation providers, Fazio Mechanical Servicesprobably after prior deep investigation to detectan easy loophole to infiltrate Target’s network for its malicious objectives. Also,Fazio relied onfree version of a security software called, “Malwarebytes Anti-Malware”, whose license explicitly prohibited corporate use; which is a fineexample of Overreliance on knowledge versus intelligence.…

    • 892 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Target Security Breach 2014 On December 15th, 2013, Target verified they were hacked. In as little as two weeks, millions of customer’s credit card and personal information were electronically stolen. Whose fault was it, technology or people?…

    • 455 Words
    • 2 Pages
    Improved Essays
  • Superior Essays

    Additionally, deliberate and comprehensive risk management makes the economy, resources, the nation, and way of life more flexible through anticipating, corresponding, and preparing for both external and internal hazards. The significance of a risk management strategy is in the capability to differentiate between diverse choices in larger context rather than in the endorsement of a particular action response. Risk management is vital for the leaders of homeland security in prioritizing contending requirements and permitting comprehensive approaches to determine performance and specify…

    • 1169 Words
    • 5 Pages
    Superior Essays
  • Great Essays

    Hacking In Healthcare

    • 1225 Words
    • 5 Pages

    Introduction Hacking the Healthcare System Healthcare has the highest cyber-attacks in the industry. This is only growing. Nearly half of all health care organizations have reported criminal attacks that caused a breach in their systems (Goodman, 2015). These hackers are gaining access to the electronic health information. Identification, banking information, and pharmacies used are just some of the data that these online hackers are getting their hands on.…

    • 1225 Words
    • 5 Pages
    Great Essays
  • Improved Essays

    Data breaching is the act of confidential information being releasing intentional or unintentional (Beal, n.d.). The ultimate goal of hackers when performing data breaches is to gain complete access to fully secured database or repository. Majority of data breaches occur within digital data conducted over a network with connection, like the Internet. It very common for company’s such as department stores to be vulnerable to these attacks due to the amounts of data that is stored within their systems. When these attacks on data occur many customers to companies experience a betrayal of trust within the company (Trend Micro).…

    • 680 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    A Risk Assessment Plan plays a big role in any company, whether it is big or small company. The risk assessment will help identify the vulnerabilities and threats to the Wells Fargo IT resources. Which will help determine the impact of those vulnerabilities, threats, and unauthorized access. Having some knowledge of what type of risks expect will help mitigate them faster. There are a several steps needed for a good risk assessment plan, which will essentially help the company be in compliance with FISMA and other federal laws.…

    • 720 Words
    • 3 Pages
    Decent Essays