Target Breach Case Study

Improved Essays
Our group decided to discuss the Target breach. This breach occurred in 2013 when they stated hackers broke into the retailer’s network using login credentials stolen from a heating, ventilation and air conditioning company that does work for Target at a number of locations. This company called Fazio had access rights to Target’s network for carrying out tasks like remotely monitoring energy consumption and temperatures at various stores. The attackers leveraged the access provided by the Fazio credentials to move around undetected on Target’s network and upload malware programs on the company’s point of sale systems. The hackers first tested the date-stealing malware on a small number of cash registers. After they noticed it worked and it went through they uploaded it to majority of Target’s POS systems. During November 27th to December 15th 2013, the attackers used the malware to steal data on about 40 million debit and credit cards, 70 million addresses, phone numbers, and other pieces of personal information. This is one of the busiest times of the year with two major holidays and so many people are shopping …show more content…
Target had a team of security specialist in Bangalore to monitor its computers 24/7. Now the security operation center was located in Minneapolis. On November 30th Fire eye spotted the hackers. Bangalore got an alert and the Minneapolis team was flagged but nothing happened. Minneapolis did not take action on the alarms. Our group feels if an alert is generated that there's an intrusion, it shouldn't have been handled by email or a ticketing system. It should have resulted in a phone call to the on-call person, if necessary and a conference bridge until the event was diagnosed and acted upon. If it was acted up on immediately it could have been avoided or less amount of confidential information would have not been

Related Documents

  • Improved Essays

    Target Breach Case Study

    • 740 Words
    • 3 Pages

    Nothing seemed out of the normal to consumers or cashiers because they were still using the same old equipment that they were used to. This was not fair to the costumers however and has never been fair. Target exploits the breach of private information themselves to make a much larger and more efficient marketing organization. They are more than happy to divulge the personal information that comes up when a credit or debit card is swiped. Target ignored the warnings, perhaps because its people mistrusted the comparatively new monitoring…

    • 740 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    Target quickly removed the malware that was being utilized by the cybercriminals Date 5: December 19, 2013 (34 days after Date 1) – Target officially announces attack and the theft of debit/credit information. Target also launched a major public relations operation to assure their customers that the technology used by the attackers had been found and…

    • 591 Words
    • 3 Pages
    Great Essays
  • Great Essays

    This author himself is a highly educated, college professor. Even with that perspective of being a scholar in this field of study for more than 5 years, Herb does not frame this article to be viewed by other highly educated university professors in his similar field of study. As I mentioned before he aims this article at a more general population. The actual audience of this piece would be subscribers to the Washington Post where this article was published. In addition to the subscribers, the ideal audience would include individuals in care about the Equifax hack or cyber space policy and security.…

    • 1616 Words
    • 7 Pages
    Great Essays
  • Decent Essays

    Target received red flags right before the actual attack. Due to common cyber crimes target was already aware of the threats that happen so they installed $1.6 million malware detection tool Fireeye. They also had a team of security specialists in Bangalore and Minneapolis who monitor its computers around the clock. Fire eye did its job and notified them on multiple occasions about the incident that’s going to happen; unfortunately security team appears to have made wrong call. "…

    • 332 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Target Case

    • 399 Words
    • 2 Pages

    To date they have approximately 1800 throughout the United States (kinicki & Williams, 2016 p.38). Another standard method,is they have welcomed domestic designers to provide more affordable products for their customers (Design & innovation, n.d.). After the misfortune of the cyberattack, Target began upgrading their database and invested in the credit card technology for added security (Kinicki & Williams, 2016 p.37). Next when confronting the issue of diversity Target has partnered and sponsored a number of groups and affiliations of different ethnic and cultural groups. The have even adopted outreach efforts to provide to the community around them.…

    • 399 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Home Depot Fraud Essay

    • 1360 Words
    • 6 Pages

    November 6, 2014, Home Depot Inc., the world’s largest home improvement retailer was hacked by cybercriminals. Hackers gained access to Home Depot Inc., systems by stealing a password from a vendor. The hackers were able to breach Home Depot computer system and steal information for 56 million credit and debit card accounts and 53 million email address of customers. Although, the hackers had only access to the perimeter of Home Depot networks it was a vulnerability in Microsoft Windows which allowed them to fully breach the network. Moreover, the hackers were able to infiltrate the company’s point-of-sale system using high lever permissions, which allowed them to deploy malware on Home Depot self -check out system.…

    • 1360 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    Target Breach

    • 1769 Words
    • 8 Pages

    I believe this was the best move for the company. They could not inform the public before they fixed the problem. Target also released multiple press releases following the incident to keep customers informed on the hack. I believe Target informed the customer’s in a timely manner, but could have done it in a better way. They emailed the customers in regards to the data breech, but so were spammers and other hackers.…

    • 1769 Words
    • 8 Pages
    Improved Essays
  • Improved Essays

    Target Executive Summary

    • 508 Words
    • 3 Pages

    At the current moment Target is aggressively promoting its grocery department and had expanded to markets in Canada, but in early 2015 it had decided to cease its operations in Canada. (Hoovers, Inc., 2015) Competitive Landscape Target is in a crowded field because of their large product line up. Since Target offers a large selection of products they compete with all sorts of companies such as toy stores, pharmacies, grocery stores, and home furnishing stores. Having a large product catalog means the company competes with vendors such as, Kohl’s, CVS, Best Buy, Costco, and many more. Targets’ top competitors include, Amazon,…

    • 508 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Target Breach Essay

    • 1427 Words
    • 6 Pages

    Target could have truly prevented this attack from happening. However, due to negligence on the company's behalf, the network upgrade was tabled and the consumers suffered that decision. The Target Corporation failed to be good stewards over the consumer's trust, and causing the consumer's sensitive information to be compromised. In hindsight, had the security systems been the top priority the data breach may have been avoided.…

    • 1427 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    Target Corporation is the co-developer of the threat detection system called Trident. Working with Walmart Technology Group from Chicago, MS, Trident was developed supporting the AMRDEC on Redstone Arsenal. Recently, Target and Walmart worked with the Alcohol, Tobacco and Firearms (ATF) office in Denver, CO to deploy an array of Trident systems in support of a serial shooter investigation. As part of that deployment, the ATF has identified the need to work closely with Target and Walmart to adapt the Trident system for a broader use to support their mission. The result is a proposed effort working with the National Center for Explosives Training ad Research (NCETR) office on Redstone Arsenal to enhance Trident to meet ATF requirements, and…

    • 339 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Target's Case Summary

    • 914 Words
    • 4 Pages

    The minute the malware was detected, the software could’ve been automatically deleted. The Target security team made an executive decision to ignore warnings in November of 2013 of a security breach, leading to one of the most historic data breaches at that time. Looking back, it also appears Target had a major control weakness with their supplier portal – leaving it extremely vulnerable to hackers. Target did not require a login for their vendors and although they had set up firewalls to protect sensitive information, Target obviously “had some holes” in that system.…

    • 914 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    Target has had a 3.1% increase in sales, 3.4% increase in Earning Before Interest and Tax, 5.9% in Net Earnings, and 9.7% in Diluted Earnings Per Share. Target has had more growth in 2015 as it is leading on having success on its turnaround from the 2013 hacking scandal. The 2013 hacking scandal was when Target security was breached and that it went through hard times to build back its trust with its customers. This let the industry as a whole to change throughout. The retail industry is changing with new competitors, innovation, products and services.…

    • 689 Words
    • 3 Pages
    Decent Essays
  • Superior Essays

    After 9/11 they changed the policies, to make the ICS adaptable for managing all crisis’s. However, not all situation were proven successful with this method, the Pentagon attack was deemed as a success. Success and Failures…

    • 1817 Words
    • 8 Pages
    Superior Essays
  • Great Essays

    Data Breaches In Research

    • 1346 Words
    • 6 Pages

    Types of data breaches Safeguarding and securing information is an important aspect of business that allows for preventing and minimizing risks. With data breach or incidents in which information is compromised, both businesses and consumers are greatly impacted, due to adverse consequences that may follow. The globalization of today’s economy is dependent upon electronic access via the internet, email, and “other components of “cyberspace,” including the global consumer credit card payment networks. Different types of informational or data breaches that significantly affect business functions involve compromise of financial data, customer’s private information, and business proprietary data. Data breaches totaled 1,540 worldwide in 2014…

    • 1346 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    I conclude that the overall results of the total data records breached means that if more than one organization has all our sensitive information such as our full names, social security numbers, date of birth, credit card numbers, and etc. then we are more likely have a higher risk of getting exposed more than once if the organization’s database is maliciously attacked. To continually increase awareness in data breach protection best practices will help Businesses and other organizations to lower the risk and minimize the impact of data breach in the future as technology continues…

    • 952 Words
    • 4 Pages
    Improved Essays