Question

In: Computer Science

Target handles a lot of data from many different sources (customers, vendors, suppliers, employees, etc.). The...

Target handles a lot of data from many different sources (customers, vendors, suppliers, employees, etc.). The concept of Big Data is a concern for such companies. Answer the following questions: What was the weakness behind the Target data breach? Were third parties involved? How did Target run its POS system? How could it be prevented? How much does human error come into play with big enterprise security breaches? What are some challenges in Big Data with regards to security?

Solutions

Expert Solution

There are multiple theories on how the criminals initially hacked into Target, and none of them have yet been confirmed by Target Corporation. However, the primary and most well-supported theory is that the initial breach didn’t actually occur inside Target. Instead, it occurred in a third party vendor, Fazio Mechanical Services, which is a heating, ventilation, and air-conditioning firm. According to this theory, we present the timeline of the incident . Attackers first penetrated into the Target network with compromised credentials from Fazio Mechanical. Then they probed the Target network and pinpointed weak points to exploit. Some vulnerabilities were used to gain access to the sensitive data, and others were used to build the bridge transferring data out of Target. Due to the weak segmentation between non-sensitive and sensitive networks inside Target, the attackers accessed the point of sale networks.The timeline of target data beach is follows in fig 1.

Even if Target had a valid reason for giving Fazio access, the retailer should have segmented its network to ensure that Fazio and other third parties had no access to its payment systems.

Several mature processes and practices currently exist for securing third-party access to enterprise networks, Brazil said. Even the Payment Card Industry Data Security Standard, which companies like Target are required to follow, specifies network segmentation as a way to protect sensitive cardholder data.

In the Target breach, BlackPOS was installed on Target’s point of sale terminals, and the integrity of POS systems was compromised.

Target's point of sale (POS) systems This iSIGHT Partners report provides details about the malware, code-named Trojan.POSRAM, used to infect Target's POS system. The "RAM-scraping" portion of the POS malware grabs credit/debit card information from the memory of POS-devices as cards are swiped. "Every seven hours the Trojan checks to see if the local time is between the hours of 10 AM and 5 PM," mentions the iSIGHT Partners report. "If so, the Trojan attempts to send winxml.dll over a temporary NetBIOS share to an internal host (dump server) inside the compromised network over TCP port 139, 443 or 80."

Target utilizes its own in-house point of sale (POS) system that has been developed by its IT department, Target Technology Services. Each store has its own servers capable of running about 30 registers and these are supported by a third party IT services provider who have technicians trained in Target store procedures. Target stores do not employ full-time IT staff.

Over the last few years Target has significantly upgraded its IT infrastructure. Each store now operates with two servers which run the company's custom POS system. Having two servers per store means Target can run up to 30 cash registers as well as inventory, stock control and pharmacy databases.

This technique allowed attackers to steal data from POS terminals that lacked internet access.

Once the credit/debit card information was secure on the dump server, the POS malware sent a special ICMP (ping) packet to a remote server. The packet indicated that data resided on the dump server. The attackers then moved the stolen data to off-site FTP servers and sold their booty on the digital black market.

This key step for data breach can be prevented by enforcing the integrity of point of sale terminals. Therefore, we provide a practical scheme using digital signatures and certificates for ensuring the integrity of operating systems on point of sales.

Attackers compromised Fazio Mechanical Services. Attackers broke into Target’s network and tested malware on POS machines. Attackers began to collect credit card data. POS malware fully installed. Attackers installed data exfiltration malware. Symantec and FireEye alerts triggered. Attackers began to move credit card data out. Additional FireEye alerts triggered. Department of Justice notified Target. Target removed most malware.

Preventing the breach at several points.

  • Improved monitoring and logging of system activity
  • Installed application whitelisting POS systems and
  • Implemented POS management tools
  • Improved firewall rules and policies
  • Limited or disabled vendor access to their network
  • Disabled, reset, or reduced privileges on over 445,000 Target personnel and contractor accounts
  • Expanded the use of two-factor authentication and password vaults
  • Trained individuals on password rotation

Due to Target’s poor segmentation of its network, all that the attackers needed in order to gain access into Target’s entire system was to access its business section. From there, they gained access to other parts of the Target network, including parts of the network that contained sensitive data. Once they gained access into Target’s network they started to test installing malware onto the point of sales devices. The attackers used a form of point of sales malware called BlackPOS. The attach steps of the target breach is given as below in fig 2.

Human error can impact the success of even the strongest security strategies. As the above attacks illustrate, this can happen in numerous ways. Here are just a few:

  1. SSH keys grant privileged access to many internal systems. Often, these keys do not have expiration dates. And they are difficult to monitor. So, if SSH keys are revealed or compromised, attackers can use them to pivot freely within the network.

  2. Many phishing attacks leverage wildcard or rogue certificates to create fake sites that appear to be authentic. Such increased sophistication is often required to target higher level executives.

  3. Using public key encryption and authentication in the two-step verification makes it harder to gain malicious access. Easy access to SSH keys stored on computers or servers makes it easier for attackers to pivot laterally within the organization.

  4. An organization’s encryption is only as good as that of its entire vendor community. If organizations don’t control the keys and certificates that authenticate partner interactions, then they lose control of the encrypted tunnels that carry confidential information between companies.

  5. If organizations are not monitoring the use of all the keys and certificates that are used in encryption, then attackers can use rogue or stolen keys to create illegitimate encrypted tunnels. Organizations will not be able to detect these malicious tunnels because they appear to be the same as other legitimate tunnels into and out of the organization.

There is no silver bullet in cyber space against data breaches. With the increasing amount of data leak incidents in recent years, it is important to analyze the weak points in our systems, techniques and legislations and to seek solutions to the issue. presented a comprehensive analysis of the Target data breach and related incidents, such as the TJX breach. We 10 described several security guidelines to enhance security in merchants’ systems. We presented the state-of-theart credit card security techniques, and gave customers best practices to hide card information during purchase transactions

Problems with security pose serious threats to any system, which is why it’s crucial to know your gaps. Here, our big data consulting experts cover the most vicious security challenges that big data has in stock:

  1. Vulnerability to fake data generation
  2. Potential presence of untrusted mappers
  3. Troubles of cryptographic protection
  4. Possibility of sensitive information mining
  5. Struggles of granular access control
  6. Data provenance difficulties
  7. High speed of NoSQL databases’ evolution and lack of security focus
  8. Absent security audits

Now that we’ve outlined the basic problem areas of big data security, let’s look at each of them a bit closer.


Related Solutions

Ethics prescribes expected behavioral norms for employees, and often the vendors and suppliers. The company's ethics...
Ethics prescribes expected behavioral norms for employees, and often the vendors and suppliers. The company's ethics are often communicated in the form of a Code of Conduct that is usually available on the organization's website. You will do some reading and research to see how ethics impacts motivation and an organization's culture Access the article on ethics by Bart C. (2011) in the Reading area. Based on the recommendations by Bart in the article: How has your current or previous...
1. Describe how to protect and use corporate data – employees, customers, suppliers, and business partners....
1. Describe how to protect and use corporate data – employees, customers, suppliers, and business partners. 2. Define privacy in common sense. Explain the relationship between protection of privacy and corporate business well-being. Explain employee email privacy and employer monitoring of Web surfing in the company. Explain corporate use of information about employees’ off-the-job behavior (e.g., lifestyle, marital arrangements, social networking, and so forth).
There are many ways to collect data on target customers. What are some of the legal...
There are many ways to collect data on target customers. What are some of the legal and ethical factors relating to obtaining and and using consumer data? How do you ensure your company is doing the right thing with collected data?
1. Which of the following is not a stakeholder in a business? employees suppliers customers competitors...
1. Which of the following is not a stakeholder in a business? employees suppliers customers competitors 2. Which of the following does NOT describe managerial accounting? not generally released to the public various formats are used used for the SEC filings used primarily for internal making 3. Jones company makes two products A & B. Here is some financial information about those products.                          A    B     Combined total cost of cost drivers Direct labor    $45,000 $35,000 Direct...
Customers and suppliers are the foundation of the data that will be processed in your accounting...
Customers and suppliers are the foundation of the data that will be processed in your accounting system. Identify and discuss at least three (3) things you can do to ensure that processing customer and supplier transactions are handled efficiently and effectively in QuickBooks. Justify your response. Briefly describe the difference between a supplier and a vendor.
A grocery store buys Italian gelato from different suppliers and sells the desserts to its customers...
A grocery store buys Italian gelato from different suppliers and sells the desserts to its customers for $5 per pint. In September, the following purchases and sales occurred. You are to find the COGS, ending inventory and Gross Margin using FIFO and LIFO. September 2, purchase 30 pints at $2.50 each September 6, purchase 20 pints at $3 each September 20, purchase 25 pints at $4 each September 5-8, sell 10 pints to customers September 9-19, sell 20 pints September...
why is it important to have software vendors (such as SAP, Oracle,etc.) use the audit data...
why is it important to have software vendors (such as SAP, Oracle,etc.) use the audit data standards?
Research at least four different data loss prevention (DLP) products from four different vendors. Compare at...
Research at least four different data loss prevention (DLP) products from four different vendors. Compare at least six different functions and options. Based on your research which would you choose? What features make this product the optimum? Why? Write a summary of your research. Minimum 150 words for your response
The following sample data reflect shipments received by a large firm from three different vendors and...
The following sample data reflect shipments received by a large firm from three different vendors and the quality of those shipments. (You may find it useful to reference the appropriate table: chi-square table or F table) Vendor Defective Acceptable 1 27 119 2 19 79 3 27 202 b-1. Calculate the value of the test statistic. (Round intermediate calculations to at least 4 decimal places and final answer to 3 decimal places.)
The following sample data reflect shipments received by a large firm from three different vendors and...
The following sample data reflect shipments received by a large firm from three different vendors and the quality of those shipments. (You may find it useful to reference the appropriate table: chi-square table or F table) Vendor Defective Acceptable 1 27 119 2 19 79 3 27 202 b-1. Calculate the value of the test statistic. (Round intermediate calculations to at least 4 decimal places and final answer to 3 decimal places.)
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT