The Target Security Breach Essay

1141 words - 5 pages

Computer crime has been an issue since the beginning of computers. Wherever there is something good, there is always someone who takes advantage of it. This can be seen in cyber crime, which has been on the rise in recent years. According to the Los Angeles Times, the median cost of computer crime to a company per year has risen from $3.8 million dollars in 2010 to $5.9 million. (Rodriguez, 2011) This suggests that computer crime is becoming an even bigger hazard to companies. A recent example of this was the data breach committed against Target in 2013.
Target is a well-known company in the retail industry with 1,778 stores as of 2012, according to the company. In December 2013, it was reported that Target had experienced a data breach that affected more than 40 million debit and credit cards used at Target over a three-week period, starting from November 27, 2013. (Grant, 2013) It was later revealed that not only were debit and credit card numbers stolen, but expiration dates, security codes, names, addresses, and phone numbers were stolen as well. (Rosenblum, 2014) There are a number of things that can be done with information, including creating replica cards to make online purchases.
Information is still coming to light about the Target data breach, as the company is still actively pursuing an investigation. It has been revealed that the hackers involved in the incident began by moving data from the Target networks to Fazio, an HVAC company that Target does business with and sends a lot of digital data to, and out to a number of servers in the U.S. and Brazil. (Mick, 2014) This made it hard to spot the attack initially because a lot data was being sent to Fazio on a regular basis. It also makes the data thieves much harder to track.
According to Greg Steinhafel, Target CEO, on December 15, 2013, it was confirmed by Target that there was in issue regarding the data and security measures were taken to ensure that the information was “safe and secure.” The next day, an investigation started onto what happened and who was involved in the breach. Three days after the confirmation of the breach, Target informed customers of the data breach, by letter from the CEO and by media, including what steps customers needed to be taken in order to protect themselves. Immediately following this, Target offered affected customers a free credit monitoring service as well as a telephone hotline. A storewide 10% discount was also offered to all customers for two days following the incident. (“Target security breach:,” 2013)
Since the breach, Target has reported more than $61 million in expenses relating to the breach. They are also undergoing many government investigations and are facing more than eighty lawsuits. Since the ordeal is relatively new, the company is unable to determine if this will impact the company long-term; however, sales following the breach have been weaker than expected. (Lobosco, 2014) It will be interesting to see what types of...

Find Another Essay On The Target Security Breach

World of Network Security Infirmities Essay

1708 words - 7 pages earnings went a little sour last year due to a security breach. The company’s stock dropped from $63 to $62.67 when news of breach the hit the airways (Associated Press). Hackers stole over 70 million customers personal information to include names, phone numbers and email address (Associated Press). Target reports that the breach occurred between Nov.27 thru Dec. 15 (Associated Press). Wireless –Hotspot are more prevalent now than in the past

Overview of Cyber Security Essay

1482 words - 6 pages Online security breaching is criminal activity that can happen from any part of the world through the hacking of any infrastructure. Most breaches are done through the falsifying and personal information or even a breach of security stemming from lack of security. Now that more and more crime is happening over the internet there many different aspects to security as a whole. Due to the drastic increase in modern cybercrime the police

Why Do Companies Need Ethical Hacking?

1411 words - 6 pages that they are, they manipulate and bypass security systems without being detected by the organizations. Organizations rarely notice when there has been a breach of security this goes to show how smart hackers really are. Why do companies keep falling victims of such attacks? Most companies rely on defense tools such as firewalls, anti-virus software’s, DPI firewalls, etc. as defense that protects their confidential information but these measures

huffman trucking

1341 words - 5 pages provide an entirely new look and feel to the internet; however, they also provide hackers with new methods of invading company networks.Security measures must be implemented to ensure no security holes breach Huffman Trucking's systems, especially while using the Benefits Elections Systems. Upgrading Huffman's current network, data, and internet security in their four facilities will provide them with the highest security measures to prevent

huffman

1341 words - 5 pages provide an entirely new look and feel to the internet; however, they also provide hackers with new methods of invading company networks.Security measures must be implemented to ensure no security holes breach Huffman Trucking's systems, especially while using the Benefits Elections Systems. Upgrading Huffman's current network, data, and internet security in their four facilities will provide them with the highest security measures to prevent

Overvie of CORE Methodology

1509 words - 6 pages Electrical Equipment are Disabled If people, don’t disable Zones Zones FASAM Activate Sprinklers Check if Electrical Equipment are disabled Disabled, Activate Sprinklers Not-Disabled, Not activate Sprinklers. Sprinklers Sprinklers   The Security Alarm System Viewpoint Source Input Action Output Destination FASAM Breach detected Notify manned control area Message Displayed ‘Breach Detected in a Zone [ ]’ Control Area Guard FASAM Confirms

brute force

582 words - 3 pages cluster was able to use every possible eight-character passwords including uppercase and lowercase letters, all possible digit and symbol combinations. Another key factor is that the attack may come from more than one attacking device. A hacker can hijack and use other machines to use against the target device. Imagine how quickly a hacker could breach a security system if he/she were to have just two ars technica computer clusters attacking one

Hacking as a Means of Identifying Weaknesses in Computer Security

1651 words - 7 pages patched thus decreasing the chance of a breach in the system and increasing its overall security and reliability. In the context of computer security, a hacker is someone who seeks and exploits weaknesses in a computer network or a computer system. Hackers may be motivated by a number of reasons ranging from protest to profit. An ethical hacker is a computer expert who attacks the security of a certain system on behalf of its owners seeking for

Security in the Computer World

1434 words - 6 pages social networking websites opened more doors to information breach. According to a survey held by Global information security survey (GISS), 60% of enterprise found their level of increased risk due to use of social networking, cloud computing and personal devices in the enterprise which resulted in an increase of 46% in their annual investment of information security. Generally, attackers try to target small businesses for financial crimes. Small

Key Metrics in a Successful IT Security Operation

792 words - 4 pages There are many different metrics that help to define a successful data security strategy. The specific metrics and goals will differ from one organization to the next depending on their goals and customer needs. The recent data breach at Target outlines the importance of data security. Organizations should periodically review their metrics and make adjustments to them in order to stay ahead of any gaps in their process. “The task of developing a

psychological contract

948 words - 4 pages Employment plays an important role in human resource management. It not only helps the employer to find the suitable employee to improve or contribute to the company but also increase the competition between companies as well as competitors. Choosing a suitable employee for the right position is not an easy thing that an employer can manage. To target the requirements of employment, the appearance of psychological contract is one of the most

Similar Essays

Attack And Breaches Into The Networks Og Organizations

1267 words - 5 pages management plans will need to be constantly monitored and adapted. Complacency in regards to risk management leaves organizations vulnerable to newer and more advanced threats. Attacks and Breaches There have been a number of security breaches into retailer’s systems that have resulted in the loss of customer data, but the most widely publicized instance in the past year was the Target stores data breach. This attack occurred at the beginning of

Data Breach And Its Financial Implication

917 words - 4 pages year good for hackers which involved many personal and well as organizational data breach. There were some massive retail breach which took away the confidence of shoppers in online shopping. Some of these breaches are: Target: On December 18, 2013, security experts at Target disclosed a major data breach in which millions of customer’s credit and debit card’s information have been compromised. Target revealed that more than 40 million customer’s

How Hackers Steal Credit Card Imformation From Companies During Black Friday

1156 words - 5 pages Hackers stole credit card information from customers who shopped at Target or Neiman Marcus, during the 2013 shopping season that stretches from black Friday through Christmas. Target was the first company to inform the public that their credit card systems have been hacked. Neiman Marcus informed the public of their own security breach caused by the same hackers that attached Target shortly after Target went public with the security breach

Transport Layer Security Essay

1305 words - 5 pages Computers are used for nearly everything today, from entertainment to business, and even banking. Though convenient, this makes computers and the internet a prime target for fraud, and security paramount. Recently, however, there has been security exploit after security exploit, some of which need nothing more than typing in a website and clicking “Go!” A couple have even been known for years before being fixed. This creates debate whether