Question

In: Operations Management

Week 16 E-businesses tend to store vast amount of customer data including emails, DOBs, Credit card...

Week 16

E-businesses tend to store vast amount of customer data including emails, DOBs, Credit card information, and other critical personal information. It is important that such businesses spend the required budget on security to protect customer data. In the past several years, many companies have been hacked and millions of customers’ data have been compromised. List two e-businesses whose data have been compromised due to the lack of a robust secure system to protect customers. List and elaborate.

BUS 368 classmates, please do not use the same answer.

BUS 368 classmates, please do not use the same answer.

BUS 368 classmates, please do not use the same answer.

11/28/18

Solutions

Expert Solution

  • British airways-Website and the online booking had a data breach in from August 21, 2018, to September 5, 2018. There was a data breach affecting 380,000 payment cards. The data breach compromised the personal and financial details of people making a booking on ba.com and the airline's app during this period. British Airways were contacting all customers to contact the banks and change their passwords to protect themselves. The British Airways also requested the customers to be wary of any scam emails. The prime reason was credit card skimming malware which was installed on the British Airways website by the hackers. It was popularly known as “just 22 lines of malicious javascript”hacked the website.
  • Yahoo has data breach where they estimated the personal information and data of 3 billion users had been compromised. The breach included people names, passwords, date of birth and email address. The breach impacted Yahoo valuation by $ 350 million. The hacking was done by sending a single spear-phishing email with a link to a user in Yahoo office. As soon as mail was accessed the malware was downloaded on the network.

Belan the Russian hacker created a backdoor into the server, which gave him access to yahoo internal control center for Yahoo email accounts. He copied and exported a copy of the backup data from where he gained information about people and their personal details. He later created duplicate credentials to forge data and tricked yahoo servers to recognize them as account holders. Data was used to target Russian journalist, Russian cybersecurity employees, and officials.


Related Solutions

(A) A major store is interested in estimating the mean amount its credit card customers spent...
(A) A major store is interested in estimating the mean amount its credit card customers spent on their first visit to the chain's new store. Fifteen credit card accounts (n=15) were randomly sampled and analyzed with the following results: and S = 20. a) Construct a 95% confidence interval for the mean amount its credit card customers spent on their first visit to the chain's new store. b) Interpret the results (the interval) you got. (This is the question as...
A major department store chain is interested in estimating the average amount its credit card customers...
A major department store chain is interested in estimating the average amount its credit card customers spent on their first visit to the chain's new store in the mall. 15 credit card accounts randomly sampled produced a mean of $50.50 and a standard deviation of $20. Find a 95% confidence interval for the average amount the credit card customers spent on their first visit to the chain's new supply store in the mall.
A major department store chain is interested in estimating the mean amount its credit card customers...
A major department store chain is interested in estimating the mean amount its credit card customers spent on their first visit to the chain’s new store in the mall. Fifteen credit card accounts were randomly sampled and analyzed with the following results: X = $50.50 and S = 20. Assuming that the amount spent follows a normal distribution, construct a 95% confidence interval for the mean amount its credit card customers spent on their first visit to the chain’s new...
Explain how the increased use of e-commerce, including electronic data interchange (EDI), by businesses has affected...
Explain how the increased use of e-commerce, including electronic data interchange (EDI), by businesses has affected the auditor or accountant.
The Tesco case was discussed in the Week 2 Interactive Tutorial. Companies like Tesco gather a massive amount of data through different loyalty card programs
The Tesco case was discussed in the Week 2 Interactive Tutorial. Companies like Tesco gather a massive amount of data through different loyalty card programs. Typically, the shoppers fill out an application form in the shop and receive a plastic card and a key fob* in the mail that is scanned before they make a purchase. In this way, the companies gather massive amounts of data about their customers’ millions of purchases each week. From a company perspective, this is...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT