Target Security Breach Case Study

Improved Essays
Target Security Breach 2014 On December 15th, 2013, Target verified they were hacked. In as little as two weeks, millions of customer’s credit card and personal information were electronically stolen. Whose fault was it, technology or people? The Target security breach was successful because of two human failures. Target hired a “team of security specialists in Bangalore” who where part of FireEye, a recognized computer security firm, to monitor their computers at all times (Riley). This permitted Target’s security operations center in Minneapolis to be immediately notified of any suspicious activity. The sophisticated system sent out two alerts that should have stopped the hackers in their tracks and prohibited the breach. The first alert on November 30th, 2013 notified FireEye that malware was detected and it was forwarded to Minneapolis. The alert was overlooked, because according to security experts who have …show more content…
This setting, when turned on, insured the company protection from numerous potential malware, because it allowed the system to monitor itself. Target’s security personnel failed to keep this setting enabled due to the company wanting “to have the last decision of ‘what do I do’” (Riley). The company’s pride of wanting to monitor and control everything backfired because the breach showed that some things need human and technological observation. Target had time to realize this because “experts believe Target’s team received hundreds of such alerts on a daily basis, which would have made it tough to have singled out a malicious threat”, thus proving that the security team was overwhelmed and incapable of monitoring all incoming alerts (Finkle). If the option were turned on since the malware was in fact detected, it would’ve been deleted by the first alert in November. “The breach could have been stopped without human intervention”

Related Documents

  • Decent Essays

    The RP was not aware if the incidents occurred during…

    • 146 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Figure 6 shows Internal Security settings that were not set as high as they might have been to aide in threats that require a human response. Lesson 7: Invest in good technological defenses, but do not under invest in people who will be operating this equipment. Another, related lesson learned here is the need to strive to be excellent, rather than average. This stems from the view that we had taken during many simulation results that we were still doing "pretty good" when looked at in the context of all sectors taken together.…

    • 1194 Words
    • 5 Pages
    Improved Essays
  • Decent Essays

    The government was still hesitant about what had happened so they…

    • 172 Words
    • 1 Pages
    Decent Essays
  • Great Essays

    Attack Timeline, Target’s Perspective Date 1: November 15, 2013 – Cybercriminals conduct attack on HVAC systems. Criminals penetrated Target’s point of sale network and installed malware on terminals. Date 2: November 27, 2013 (12 days after Date 1) – Cybercriminals begin stealing information from 40 million debit/credit cards from Target’s systems. *Last known attack from cyber criminals* Date 3: November 30, 2013 (15 days after Date 1) – Target acknowledges publicly that FireEye had been giving more alerts but local teams deemed that no action had to be taken against the alerts so Target did nothing. Date 4: December 13, 2013 (28 days after Date 1) – U.S. Department of Justice notifies Target executives about fraudulent debit/credit information connected to Target transactions.…

    • 591 Words
    • 3 Pages
    Great Essays
  • Improved Essays

    9/11 Research Paper

    • 290 Words
    • 2 Pages

    Everyone was cautious after this. Nobody knew if anything else would happen. Also people were thinking…

    • 290 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    Target received red flags right before the actual attack. Due to common cyber crimes target was already aware of the threats that happen so they installed $1.6 million malware detection tool Fireeye. They also had a team of security specialists in Bangalore and Minneapolis who monitor its computers around the clock. Fire eye did its job and notified them on multiple occasions about the incident that’s going to happen; unfortunately security team appears to have made wrong call. "…

    • 332 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    “0736 hours! For Christ sake that was almost twelve hours ago. Why was I not notified sooner?” “Sir, protocol states that the commanding officer needn’t be contacted until at least a level three bio-safety security breach. Up until now, the breach remained confined in laboratories four and five which worked with non lethal threat leveled agents classified at zero or two.…

    • 355 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    Target Canada Company Target Canada company was a subsidiary of the famous target corporation based in the United States. The company came into existence in 2011, and its base was in Canada. Its functions were to control and run the operations of Target Corporation in Canada. It was a discount departmental store selling various products. I chose this company because it failed to control the market and win the hearts of the Canadian consumers despite its initial extensive expansion.…

    • 323 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Target is known for their dependable merchandise and wide variety of stores located across the United State. In total, Target has 1,826 stores nationwide and over 323,000 current employees (Corporate Fact Sheet). Target sells groceries, clothing, furniture, outdoor furniture, technology, home décor, and much more. Target has…

    • 259 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Target Breach

    • 1769 Words
    • 8 Pages

    Customers did not know who to believe. Which email was from Target? Could they click on a link for more information? Not only were customers in danger of one data breech but they had to deal with the potential for another one on top of that.…

    • 1769 Words
    • 8 Pages
    Improved Essays
  • Decent Essays

    Equifax Fraud

    • 102 Words
    • 1 Pages

    Equifax says problems with an online customer "Help" page were caused by a vendor's software code. The company is trying to reassure people there was not bee another cyber attack on its systems. Earlier, Equifax said it had disabled its credit report assistance page after reports that another part of its website had been hacked.…

    • 102 Words
    • 1 Pages
    Decent Essays
  • Great Essays

    Target Corporation Essay

    • 1079 Words
    • 5 Pages

    We now know the history of Target but how are they an alternative to profit maximization…

    • 1079 Words
    • 5 Pages
    Great Essays
  • Improved Essays

    Today’s internet has become an integral part of our daily lives. It changed the world in so many positive ways, but it has also a negative side to it. The negative issues that we are facing today with internet are our online privacy and data breaches. Recently, many people were divided in terms of their strong views about the importance of privacy and the exchange “between security needs and personal privacy” (Rainie & Maniam, 2016) as millions of Americans were also affected by online threats and privacy breaches and at the same time concerned with our security. The focus has been on government monitoring, although there are some other significant issues and concerns about how industries use our data.…

    • 952 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    They used a strategy known as target outranking that helps the retailer to outrank competitors and outrank bidding shares as well in the global market (Chiang et al.,…

    • 1419 Words
    • 6 Pages
    Great Essays
  • Great Essays

    A literature review allows a researcher to present the findings and viewpoints of other researchers in order to build on existing knowledge (Onwuegbuzie, Leech, & Collins 2012). This allows the researcher to build a solid foundation in which to further sustain their work and demonstrate the credibility of sources used. By the use of Google Scholar, EBESCOhost and proQuest I reviewed the literature pertaining to cyber awareness, cyber security, cyber attacks, the economic fallout from cyber attacks and the state of businesses taking preventative measures. Furthermore, I reviewed the literature based on the need for individuals to concern themselves with cyber awareness.…

    • 2302 Words
    • 10 Pages
    Great Essays