Question

In: Operations Management

Write an abstract and Introduction for the case of Cyber Breach of Target case.

Write an abstract and Introduction for the case of Cyber Breach of Target case.

Solutions

Expert Solution

ABSTRACT

This case is about the cyber breach of data at the retail store of TARGET CORPORATION during the eve of Christmas in 2013. this breach data of approximately 110 million customer credit card information by malware named Kaptoxa Rescator. How Target corporation dealt with the situation internally and externally is briefly explained in this case. Also, this case discussed the critics faced by Target Corporation. A leadership role in tackling cybersecurity issues learnt from this case.

INTRODUCTION

Target corporation is one of the largest United States retail business which was attacked by hackers between the time period of November to December of 2013. This is the time of Christmas when maximum shopping is done via retail stores. On December 19 official notice released by target about a data breach, the impacted customer went from 40 million to 110 million people as per investigation. and Target is supporting customers on behalf of its company loss. On further investigation in mid-January of 2014, the company confirmed that malware software has been uploaded on to its point of sale operating system at all its store. This malware operated on the window operating system and would scan the credit card data extract it and send it via FTP. There are several arrests in this case and criminals have been taking the stolen credit information and attempt to open the account and clone the credit card to make purchases.

The official name of the malware Kaptoxa-Rescator. It works in the following ways-

  • The malware would disable the internal network firewall..
  • The malware would then begin to scrape the credit card data from data files.
  • The malware would then save the credit card data to .dll file and prompt it to transfer.
  • The malware would then establish the share for the file to load into for delivery.
  • The malware would then send the share as the text file from the internal server at the target to the criminal server offshore.

RESPONSE TACTIC OF TARGET CORPORATION

  • The Target corporation immediately deletes the malware trojan horse.
  • It then swept the network for the entry and backdoor that malware used to enter the network.
  • From a risk mitigation point of view, The Target corporation did financial insurance measures to reduce the burden.
  • Target also decided to close several of its store in locations across countries.

Related Solutions

write Abstract and introduction about ohm's law experiment (800-100) word: Abstract: Introduction:
write Abstract and introduction about ohm's law experiment (800-100) word: Abstract: Introduction:
Right for the Customer or Right for the Salesperson? Introduction This case abstract is representative of...
Right for the Customer or Right for the Salesperson? Introduction This case abstract is representative of a real-world scenario. Jack was a very successful salesperson for International Business Machines (IBM), a major computer company, and was considered by his peers and customers to maintain the highest level of ethical behaviors. IBM has a highly regarded reputation in the computer industry for ethical behaviors toward customers. The company has a strict code of conduct policy regarding employee behaviors related to customer...
Case study: mechanical evaluation of asphalt mastics produced using waste stone sawdust. Write abstract and introduction...
Case study: mechanical evaluation of asphalt mastics produced using waste stone sawdust. Write abstract and introduction and conclusion with deep information about the topic.
Write an abstract for the Case The SOX compliance journey at Trinity Industries.:
Write an abstract for the Case The SOX compliance journey at Trinity Industries.:
Find an example online of a cyber attack or breach that has happened within the past...
Find an example online of a cyber attack or breach that has happened within the past 3 years. Provide the link and summarize what you found. What type of threat was represented in this example? Why/how do you feel this occurred? What could have been done differently to protect against this threat?
Tell of a cyber-security breach: What company, what happened, and what was the outcome? What are...
Tell of a cyber-security breach: What company, what happened, and what was the outcome? What are your thoughts about this security breach?
Mexico’s Move to UHC Read the abstract and introduction (1st section following abstract) to the paper...
Mexico’s Move to UHC Read the abstract and introduction (1st section following abstract) to the paper found here: 7. Short answer: What is one challenge leaders in Mexico face when developing and healthcare system? a. 8. According to this article, approximately what percentage of the Mexican population is uninsured? a. 16% b. 41% c. 47% d. 50% 9. Short answer: What is the “unacceptable paradox” referred to in the abstract? a. 10. In what year what this article written? a....
write a 500-word paper using APA Format please say which one is ABSTRACT,INTRODUCTION ,THE BODY AND...
write a 500-word paper using APA Format please say which one is ABSTRACT,INTRODUCTION ,THE BODY AND CONCLUSION AND REFERENCE.    Discuss why Enteral Nutrition is recommended over Parental Nutrion in critically ill patients who are hemodynamically stable and have a functional gastrointestical (GI) tract.
Write a full project report: Fruit Detection System Using Neural Networking. (following this procedure -Abstract Introduction,...
Write a full project report: Fruit Detection System Using Neural Networking. (following this procedure -Abstract Introduction, Methodology, Dataset, CNN-TensorFlow, Experimental Result, Conclusion, Future Work, Reference) N.B. If you don't finish the answer here fully, after I can submit another part here like Dataset, CNN. Make sure you should answer properly part by part.
Compose an Abstract and Introduction for a research paper on the Fiscal Policy that will touch...
Compose an Abstract and Introduction for a research paper on the Fiscal Policy that will touch all aspects
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT