FACEBOOK BREACH OF SECURITY

Powerful Essays
Introduction In today’s society, technology plays an important role in our everyday lives. Technology has made many lives easier, but with this ease, comes with many risks. People are becoming savvier about how to break into computer systems and access personal information. For many people, this is considered a breach of security. According to wisegeek.com, a security breach is “an incursion into a computer or network of computers, usually by hackers or malicious software that compromises sensitive data or causes damage to computers or network function.”1 Most of the time these so-called “computer hackers” find ways to evade security systems to steal important personal information such as social security numbers, home addresses and banking information. These hackers can be either a young person experimenting with information technology or an advanced computer programmer. Some will take this information and engage in illegal behavior such as leasing a car or opening a credit card or applying for a home loan. Many times this violation of security can lead to devastating consequences for the victim. On occasion, a computer security breach can be caused by only one person or a group of people. Other times, it can be caused by “malicious software, viruses, or other programs [which] are inserted into a system with the aim of destroying data or damaging the ability of a computer or network to operate.” 1 There are several types of security breach, all of which can be detrimental. “In a network-based breach, a malicious user gains access to a computer through any open network connections the computer may be using, such as a LAN connection or a wireless network connection.” 2 Another form of security breach is called malware. It is a type of “malicious software that can compromise a computer 's security…a user may unknowingly install malware by downloading a file off of the Internet or by visiting a website that automatically downloads software via the Internet


References: 1. http://www.wisegeek.com/what-is-a-computer-security-breach.htm 2. http://www.ehow.com/info_8768777_types-computer-security-breaches.html 3. http://en.wikipedia.org/wiki/Facebook 4. Kazeniac, Andy (February 9, 2009). “Social Networks: Facebook Takes Over Top Spot, Twitter Climbs” (http://blog.compete.com/ 2009/02/09/facebook-myspace-twitter-social-network/) .Compete Pulse blog. Retrieved February 17, 2009. 5. ^ "Birthday boy Mark Zuckerberg to get $100bn gift". The Times of India. Associated Press. May 14, 2012. Archived from the original on May 14, 2012. 6. ^ "Facebook squeaks onto the Fortune 500". USA Today. May 6, 2013. Retrieved May 19, 2013 7. http://www.intomobile.com/2013/06/21/facebook-security-breach-exposes-6-million-users-phone-numbers-email-addresses/

You May Also Find These Documents Helpful

  • Good Essays

    Security Breach

    • 856 Words
    • 3 Pages

    CASE WRITE-UP Case: Adobe Data Breach 1. About the Case On October 3, 2013, The Adobe Systems Incorporated in the United States of America discovered that there was a cyber-attack on their network during its regular monitoring of security check. The hackers made it through breaking in to the network and stole the sensitive and personal data of the customers which includes encrypted credit and debit card information, illegal access of customer ID 's and also source code of other various Adobe…

    • 856 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Tjx Security Breach

    • 1008 Words
    • 5 Pages

    Case Name: Security at TJX Problem Statement How should the new CIO of TJX work to strengthen security around the IT infrastructure to prevent, detect, and analyze security breaches that had previously allowed hackers to steal sensitive data? Background 1 Describe the company/department 1 History 1 Founded in 1976 2 Operate 8 business under TJX 1 TJ Maxx 2 Marshalls 3 HomeGoods 4 A.J Wright 5 Bob’s Stores 6 Winners 7 Home Sense 8 TK Maxx…

    • 1008 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Security Breach Examples

    • 321 Words
    • 2 Pages

    Nowadays, security breaches are prevalent in our environment, both physical and logical. Different types of unauthorized access are conducted by different groups of individuals for different purposes. One good example of breach is the TJX data theft that happened sometime in mid-2005 and on subsequent dates from mid-May 2006 to mid-January 2007. The TJX data theft is considered as the largest case of intrusion of data to occur to date. According to the article, the data stolen by hackers were…

    • 321 Words
    • 2 Pages
    Good Essays
  • Good Essays

    National Security Breach

    • 722 Words
    • 3 Pages

    A National Security Breach Citi mortgage, a subsidiary of Citi Bank has issued a national PR release. Citi Mortgage of Fenton, Missouri, has publicly notified the public as of May 20, 2006 several hundred mortgage applications filed by previous Citi Mortgage customers have been lost by The United Parcel Service package company of Earth City, Missouri. Citi mortgage member's social security numbers, salary information, bank account identification numbers and the home address of clients and their…

    • 722 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Ipad's Security Breach

    • 1539 Words
    • 7 Pages

    iPad’s Security Breach Meredith Morrison Strayer University BUS 508 [ November 26, 2012 ] Dr. Ronald Steffel The Goatse Security firm’s possible objectives when they hacked into AT&T’s Website was to test for security. If they could hack into the system, so can any other hacker (iPad Security Breach, 2010). The Goatse Security firm wanted to confirm that if they could gather e-mail addresses, discovering vulnerability, so can people who are hackers. “We’ve reached out to the…

    • 1539 Words
    • 7 Pages
    Better Essays
  • Good Essays

    TJX security breach

    • 801 Words
    • 4 Pages

    the failure points in TJX's security that requires attention (including, but not limited to: People, Work Process, and Technology)? After analyzing the Ivey case on TJX data fiasco, I would say there were three major failure points that caused this $168MM financial hit to the corporation. • Technology: it is obvious that TJX had several technology deficiencies mainly driven by systems limitations and vulnerability. For example, inadequate wireless network security allowed the hackers to attack…

    • 801 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Tjx It Security Breach

    • 1174 Words
    • 5 Pages

    Part I: Description In January of 2007 the parent company of TJMaxx and Marshalls known as TJX reported an IT security breach. The intrusion involved the portion of its network that handles credit card, debit card, check, and merchandise return functions. Facts slowly began to emerge that roughly 94 million customers’ credit card numbers were stolen from TJMaxx and Marshalls throughout 2006. It was believed that hackers sat in the parking lots and infiltrated TJX using their wireless network…

    • 1174 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Security Breach at Tjx

    • 755 Words
    • 4 Pages

    HBR Case Study Security Breach at TJX 1. What are the (a) people, (b) work process and (c) technology failure points in TJX’s security that require attention? While it is known that all retailers, large and small, are vulnerable to attacks, several factors including people, work process, and technology require attention so as to prevent another major attack from hitting TJX. The people associated with the attack who need attention are the top-level executives and, more importantly, the Payment…

    • 755 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Computer Security Breach

    • 870 Words
    • 4 Pages

    at any place and any time when talking about computer security incidents. Not everything goes perfectly fine when a computer system is involved. It could be something as simple as a bad cable or it could be as horrible as a hacker trying to steal all of your information. Either way, it probably isn’t going to end well. Additionally, the FBI and the Computer Security Institute, in their annual survey on computer crime and information security, gathered the following disturbing facts in 1998: 1)…

    • 870 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Security Breach at Tjx

    • 288 Words
    • 2 Pages

    MMIS 684 Information Security Management Assignment 3 Assignment 3 requires you to critically review the assigned case study and write a report to address the following questions. Question 1. Kindly provide a review of the case. Question 2. What do you consider to be the points of failure in TJX’s information security? Identify and explain at least three failure points. Question 3. How should information security at TJX be improved? Identify and explain at least three priorities. Question…

    • 288 Words
    • 2 Pages
    Satisfactory Essays