blog




  • Essay / Information security: data breach at the target...

    Nowadays, information security is an essential element in the development and maintenance of its information system by a company . As technology has become more advanced in its creation and use, the more threats a company's information system will face. A threat is a person or organization that seeks to obtain or modify data illegally, without the permission and knowledge of the owner. Likewise, a vulnerability is an opportunity for threats to gain access to individual or organizational assets (Kroenke 309). Apparently, a threat will gradually cause a company to become vulnerable, Target Corporation is a specific example. The data breach at Target Corporation, which exposed more than 110 million of its customers' personal and credit card data, appears to be linked to a malware-laced email and phishing via cyber attack. In the event of a data breach, a company can lose a huge amount of money in order to cover up the incident. In other words, creating strong information security is considered one of the most important and difficult tasks that every business wants to keep intact. The type of attack encountered by Target Corp. is most likely a malware infection. Malware infection is the most common attack threat encountered by respondents. This represents 67.1% of all cases of cyberattacks over the past ten years (Kroenke 315). The breach at Target Corp. occurred sometime before Thanksgiving 2013, when a group of European hackers installed malware in Target's security and payment system to "steal all the credit cards used in the company's 1,797 U.S. stores." company (Riley, Elgin, Lawrence and Matlack). For weeks, the malware invasion remained undetected because it evaded whatever antivirus protections Target had (H...... middle of paper ......' shopping the weekend before Christmas 2013 (Wahba, Phil and Finkle).To reduce the likelihood of exposure to this cyber risk, businesses and individuals should have technical protection measures involving hardware and software, including identification and authorization, encryption, firewalls, malware protection and application design (Kroenke One 319) should start protecting its security system by blocking and tackling a few issues When an antivirus program asks. to install the latest updates, it is necessary to allow it to do so. The reason is that the program could understand what its problem is and try to solve this problem constantly. must also limit access to these suspicious emails. These emails could contain malware and malicious programs that could penetrate their security system..