Preview

Why Did Hackers Steal Target's Customer Data?

Good Essays
Open Document
Open Document
588 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Why Did Hackers Steal Target's Customer Data?
1. How did the hackers steal Target’s customer data?
The theft of the records was caused by installing malware on the orgaznization's point of sales systems. These systems were used via third party vendors and had various security issues. This was the reason the hackers were able to break into their systems. The file that contained all the records started taking rounds in the market and was being sold in black. These records were then used to steal money from customer's accounts. There were several fake cards made and identity theft took place. The details were stolen from Faziio Mechanical. The malware was then sent to all the employees in an email. There was a possibility that Citadel malware, a program that steals passwords, was involved.
2. What types of technology could big retailers use to prevent identify thieves from stealing information?
The technologies that the retailers could use are authentication and authorization. By applying these technologies the retailers can come
…show more content…
Identity theft is the one of the biggest concerns. If a person becomes a victim of identity theft, then it is almost impossible to prove innocence. Therefore, the customers should be informed about such attacks that can take place. They need to know the consequences of using online softwares and how to tackle them. Another thing that the organizations can adopt is the authentication and authorization technologies. This will make sure that the hackers are unable to steal the data. They should also put up resistive technology in place like firewalls, content filtering and encryption. These technologies should be of the highest quality.The strength of the passwords should be really strong. If any suspicious movement of data is found, then the organization must take an immediate step and not take it lightly. Lastly, they should devise an information security plan to protect their

You May Also Find These Documents Helpful

  • Good Essays

    It/205 Week 5 Checkpoint

    • 928 Words
    • 4 Pages

    The thieves used several entry points to access TJX corporation systems. They accessed many TJX’s retail stores through poorly secured kiosks. The hackers opened up the back of those terminals and inserted USB drives to install utility software that enabled them to turn the kiosks into remote terminals linked to TJX’s networks. The firewalls that TJX use and had in place did not have enough security to offer and let bad traffic in from the in-store kiosks. The hackers also used mobile data access technology to decode data transmitted wirelessly between handheld price-checking devices, cash registers, and the store’s computers. TJX was using an outdated (WEP) encryption system, which made it easy for hackers to crack. The hackers stole user names and password to setup their own TJX account using handheld equipment and also used the data to crack encryption codes. This allowed them to access TJX system from any computer with internet. The hackers also obtained personal information which could be used for identity theft, including driver license numbers, social security numbers, and military identification of 451,000 customers. The data theft took place over an eighteen month period without anyone’s knowledge. The security controls in place out grew the total size of the company. The system was way overdue for a complete overhaul, because the system was so far out of date with the new technology. I read further about this on the internet and came to find out that the hackers went undetected for seventeen months. This time frame gave the hackers plenty of time to take forty-five…

    • 928 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Implementation and the use of this type of technology has a large impact on the privacy of the people that participate in these programs. The increased use of frequent shopper cards by retail stores has elevated the need for a watchfulness of these programs.…

    • 1122 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    Every day, US department, retail, and grocery stores lose an estimated 91 million dollars to shoplifting. But how is this happening? Are our technologies too simple, too easy to outsmart? Or are the people in today’s society underestimating their ingenuity? Despite the psychological effect of stopping some people from becoming shoplifters, anti-theft devices don't actually stop or deter the professional or determined. Not only do anti-theft devices waste people's time, they do not catch or identify shoplifters any better than a camera could.…

    • 536 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Consumer or user loosing data permanently is the last thing that a company can afford in enterprise scale. Phishing, taking Advantage of software loop holes, password loss can all lead to loss of control over the user information. Most security measure being refraining from sharing credentials between users and use a strong encryption -Decryption while exchanging critical…

    • 470 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Pat Lambert argued that 'Retail' is the answer instead of airports and store security for the new iScanner product to enable retailers to identify incoming customers, with several…

    • 1679 Words
    • 6 Pages
    Better Essays
  • Satisfactory Essays

    Townsend & Townsend

    • 577 Words
    • 3 Pages

    There is also another issue, the segregation of duties within the IT department as this is a great concern as it can create a high possibility of unauthorized changes, therefore reducing the integrity of the data and a lack of accountibility among the IT employees. We would recommend that you clearly define the duties and restrictions among the IT staff and monitor these…

    • 577 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Target Breach Case Study

    • 346 Words
    • 2 Pages

    Target faced a slew of challenges because of the aftermath of the 2013 data breach which affected up to 70 million consumers personal information (Riley et al., 2014). Most of which could have been prevented if they had the principle managerial functions in place. CEO Greg Steinhafel lacked in many of these areas to which led to his ouster at Target.…

    • 346 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Dexit Case

    • 2010 Words
    • 9 Pages

    Product/service 2 – Merchants will be provided with a retailer account, an RFID reader and a point-of-sale terminal. The RFID reader will read the consumer's Dexit tag when placed in close proximity without the need of contact as needed by the debit or credit cards meaning hassle-free fast transactions. They will be provided with a user name and a password to access their accounts via internet. Transaction settlements will be executed on a daily basis by electronically transferring the funds to the merchant's account.…

    • 2010 Words
    • 9 Pages
    Powerful Essays
  • Powerful Essays

    During, and leading up to, the recent data breach that occurred at Target, it is evident that many mistakes were made at the executive level. As any company, Target possesses a primary goal of balancing both effectiveness, and efficiency; however, the organization under CEO Greg Steinhafel did not achieve these goals simultaneously. Prior to the data breach experienced by Target, the company primarily focused on efficiency --- the act of determining and implementing the most cost effective method of utilization for products, resources, or personnel (Kinicki and Williams, 2016). This manner of management by the executives did meet the minimum requirements of cyber security set by government regulations; however, it was not not effective enough…

    • 1301 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    Kickstarter Current Event

    • 662 Words
    • 3 Pages

    With the internet came a whole new type of economy. Sites popped up with whole new ways to make purchases. Almost anything from around the world can be purchased online. For a while, the most popular transactional methods were to buy direct from a store’s website, from a large retailer like…

    • 662 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The data breach resulted from Target’s failure to segregate systems handling payment card data from the rest of its network (Bertrand, 2014). The attackers gained access to the company’s network with a username and password stolen from Fazio Mechanical Services who provided refrigeration and HVAC systems for them. With just that information alone, the attackers were able to upload malware programs on Target’s Point of Sale (POS) systems.…

    • 256 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    This chapter contains the background of the study, the statement of the problem, general objectives, justification of the study and limitations of the study and research questions.…

    • 733 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Best Buy can improve their information security to prevent the leakage of customers’ personal information. Best Buy can use the encryption technology to protect the customer’s information. Best Buy should ensure that their customers set a strong password with a complex combination such as alphabet, number and symbol to protect the information from hackers. Other than that, best buy can create an IT security engineering system that can protect the electronic information from being hacked or wiped out during the technology disaster. Best Buy can conduct online survey form that collect the feedback from the customer and give the customer some offer such as discount voucher or free gift after they complete the survey to encourage them to do the survey.…

    • 1603 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    Omni Channel Analysis

    • 715 Words
    • 3 Pages

    In the physical store that company can offer the mobile device, for instance, tablets. The buyer can use this device to look for their variety of choices via M&S’s website. The firm also can create a self-serve online by building the Kiosks inside the stores. More conveniently, the retailers can interact with the consumers via mobile devices and understand consumer’s…

    • 715 Words
    • 3 Pages
    Good Essays
  • Best Essays

    Resaerch Proposal

    • 2610 Words
    • 11 Pages

    Today internet plays a very important role in the retail industry. The retailers use the…

    • 2610 Words
    • 11 Pages
    Best Essays