Waiting for answer This question has not been answered yet. You can hire a professional tutor to get the answer.
Cyber Breach at Target case study
Target shoppers got an unwelcome holiday surprise in December 2013 when the news came out 40 million Target credit cards had been stolen by accessing data on point of sale (POS) systems. CEO of Target, Gregg Steinhafel, said in an interview that “there was malware installed on our point-of-sale registers.” With access to the POS system, the attackers would have access to all track data from customer credit and debit cards. That would expose all of the information encoded on the cards’ magnetic stripes, giving the attackers full account data customer name, credit card number, CVV number and (if it’s a debit card) the PIN.
Target later revised that number to include private data and announced that up to 70-110 million customers' data have been compromised. The breach transpired between November 27 and December 15th 2014. Over 11 GB of data was stolen. Target was made aware of this situation in mid-December when the U.S. Department of Justice informed the company that their system was being attacked. Target had received internal notifications prior to this date, but had failed to act.
The problem that impacted up to 110 million Target customers during the holiday shopping season may have been because of an inexpensive “off-the-shelf” malware known as BlackPOS. At a high level, BlackPOS is a “virus” that manipulates the code on the POS device that allows a “screen scrape” of the data at card swipe. Even with end-to-end encryption, the brief moment in time of swipe to transfer could be captured through the malware code manipulation.
Access to the system came from network credentials that were stolen from an HVAC provider based in Sharpsburg, Penn. Initial speculation was that this vendor was monitoring HVAC systems installed at Target facilities remotely via network connection and that this was the way hackers gained entry into Targets internal network. As it turned out, this was not the case. The compromised data connection was being used for “electronic billing, contract submissions and project management”, not monitoring of equipment. The network credentials were, in fact, gathered after the HVAC contractor's employee fell victim to a phishing scheme attack and clicked on a malicious email.
Target was not unprepared for the breach. Earlier that year, the company had installed malware detection software by computer security firm FireEye (high-profile FireEye customers include the CIA and Pentagon). The FireEye team in Bangalore, India monitored Target’s system around the clock, and reported the activity to Target’s security team based in Minneapolis, Minn.
Exfiltration malware was installed on November 30, 2013 to move the stolen information out of the Target servers. These drop points were first staged around the U.S., then to computers in Russia. It was at this point that the Bangalore team became aware that something was wrong and notified the Target security team in Minneapolis. For reasons that are unclear, Target's Minneapolis team failed to act on the alert, allowing customer information to be compromised.
The initial reports on this story attracted the attention of many in the construction industry. Although, in this case, access to Target's credit card system did not come through HVAC unit, that scenario is not an improbable one. Remote monitoring of HVAC equipment is possible and future security incidents are not unlikely.
Target cyber breach is the second biggest retail hack in U.S. history. In the days prior to Thanksgiving 2013, someone installed malware called BlackPOS in Target’s security and payments system designed to steal every credit card used at the company’s 1,797 U.S. stores. At the critical moment—when the Christmas gifts had been scanned and bagged and the cashier asked for a swipe—the malware would step in, capture the shopper’s credit card number, and store it on a Target server commandeered by the hackers. After reading this brief information about the Target cyber security breach, please answer the following questions:
1. In your own words, explain what was the main reason for the Target data breach?
2. If you will perform an Audit Plan, describe the most critical areas that should be included in the Audit Universe? how you can priorities between them? (at least two pages)
3. What do you think; did Target have good security measures? Recommend THREE internal controls that should be in place to help Target mitigate any possible breaches in the future?
4. Data center security is of increasing concern, with data breaches and cyber vulnerabilities more and more in the news headlines. Briefly talk about Target's new datacenters?
Project Instruction And Guidelines:
1. Use APA Format to reference any source of information (User your own words don’t copy)
Resources:
http://www.hbs.edu/faculty/Pages/item.aspx?num=51339 https://www.solutionary.com/resource-center/blog/2014/01/target-breach-overview/ http://www.zdnet.com/article/anatomy-of-the-target-data-breach-missed-opportunities-andlessons-learned/