Case Study 1: Cyber Security in Business Organizations

 

 

 

 

 

 

 

 

 

 

 

 

 

Case Study 1: Cyber Security in Business Organizations

Amare Alemu

Professor Wade M. Poole, Ph.D.

CIS 500 Information Systems for Decision-Making

May 17, 2017

 

 

 

 

 

 

 

 

 

 

 

Case Study 1: Cyber Security in Business Organizations

Introduction

         The organizational information security and protection face many challenges. Firstly, this paper will determine the fundamental challenges that organizations face in general regarding protecting corporate assets and information.   Secondly, the article will Specify the red flag(s) that Target overlooked or ignored before the direct attack and give its opinion as to why Target missed or ignored the red flag(s).  Thirdly, the paper will determine the main actions that Target took after the breach occurred and evaluated the efficiency of such operations. Lastly, the article will give 1, the conclusion on the main reasons why the attack on Target occurred; 2, its opinion as to whether the attack was mainly because of the poor infrastructure or the inability of the personnel to act accordingly; and 3, the justification for the responses.

         According to Gus Malezis, (2016), the author, mentioned five fundamental challenges that organizations face in general regarding the security and protection of organizational assets and information. The first challenge was the recognized impact of a security breach, i.e., the crime that is called Cybercrime continues to escalate in frequency, impact, and sophistication and threatens organizations regardless of size and sector. A data breach or intrusion can cause an organization to lose customers, revenue, and reputational value, experience loss of operational continuity and question the integrity of its data. The second challenge was called the skill gap which will happen whenever the security practitioners don’t fully understand the nature of their business, safety, and operational personnel will fail to see how each asset is relevant to the support of an organization’s mission. The third challenge was the explosive growth in endpoints that will double at a faster rate. The effort needed to protect so many devices can drive up security operations costs on organizations. The fourth challenge was the digital-physical convergence which will happen because of many endpoints the threat for one endpoint will end up becoming the threat for the others as well, i.e., either in an Internet of Things (IoT) or an Industrial Internet of Things (IIoT). The fifth challenge was security and technology is changing rapidly. If security must not evolve to meet today’s sophisticated threats and solutions need not adapt to accommodate the current and future needs of an organization, the cost will be innumerous.

         According to Michael Riley, Benjamin Elgin, Dune Lawrence, and Carol Matlack, (2014), ‎ specified that FireEye spotted the hackers and their traps and Bangalore got an alert and flagged the security team in Minneapolis. Target overlooked or ignored the red flag before the direct attack this was because Target thought that it had been certified to meet the standard for the payment card industry (PCI) in September 2013. However, it wouldn’t escape from suffering the data breach. Even though the infrastructure was up- to- the- standard (certified in September 2013) some opinion as mentioned earlier the personnel (skill gap) and recklessness of people at Target had negatively contributed to the attack to happen.

         The authors Michael Riley, Benjamin Elgin, Dune Lawrence, and Carol Matlack, (2014), further discussed that because of the offensive Target conducted an end-to-end review of their people, processes and technology to understand their opportunities to improve data security and committed to learning from the experience, and this attack accelerated Target information security structure to transit into chip-enabled cards. However, according to Tom Quimby, (2015), discussion, the chip -enabled information security technology that was supposed to be a solution for the recent security problem around the world, by mentioning the FBI, will not do much to stop billions of dollars of credit card fraud over the next few years. Though for the moment Target might have stopped the hackers. That doesn’t necessarily mean Target has a guaranty for the efficient way of information security and organizational assets protection.

         In conclusion, information security and protection of corporate assets within the company has become a top priority for many corporate leaders. Regarding Target this paper identified that the main reason for the attack to happen was Target Managers believed and thought that Target had been certified as to meeting the standard for the payment card industry (PCI) in September 2013. Next, the paper identified that the attack was mainly occurred not due to the poor infrastructure but due to the inability of management to act accordingly. FireEye spotted the hackers, and their traps and Bangalore got an alert and flagged the security team in Minneapolis the people did not respond at all. The paper indicated this inability of management as skill gap and recklessness.

 

 

 

 

 

 

 

 

 

References

Malezis, G. (2016). IT Security and Data Protection. Retrieved May 13, 2017

         from    https://www.tripwire.com/state-of-security/security-data-protection/

         understanding-  five-key-challenges-to-security-compliance-and-it-ops/

Riley, M. Elgin, B. Lawrence, D. and Matlack, C. (2014). Missed Alarms and 40 Million

         Stolen Credit Card Numbers: How Target Blew It. Retrieved May 13, 2017

         from https://www.bloomberg.com/news/articles/2014-03-13/target-missed-

         warnings-in-epic-hack-of-credit-card-data#p1

Quimby, T. (2015). FBI warns new chip cards insecure among growing fraud.

           Retrieved May 13, 2017 from http://www.washingtontimes.com/news/2015/nov/15/credit-card-chip- technology-not-more-secure-than-m/

 

 

 

 

 

 

 

 

 

 

 


Comments

Popular posts from this blog

Nаturаl Resource Conservаtion аnd Environmentаl Protection of the Nile River

Assignment 3: Apple versus Samsung

Week 8 Java Project [AmusementPark.java]