Premium Essay

Computer Ethic - Target Breach

In:

Submitted By yayo03
Words 2925
Pages 12
Research Paper
Target Security Breach

Abstract
In late 2013 Target Corporation’s network encountered a security breach in which millions of credit cards and customer personal information was stolen by malware that was installed onto their network. This information was to be sold on the black market to others for their illegal use. Target Corporation was indeed made aware that there was some peculiar activity within the network before the information was stolen. Their million dollar malware software, monitored by FireEye, picked up on the attack several days before any information was removed from the Target Corporation servers. Target Corporation could have easily prevented the majority of the attack and reduced if not eliminated the amount of credit cards and personal information that was stolen. The fact that Target Corporation was warned of the initial breach, as well as an additional breach, and did not respond for two weeks is unfathomable and unethical. The Target Corporation has a duty to secure any and all credit card and personal information that they collect from their customers. I believe that in this case Target Corporation did not act accordingly and should be held liable. Target Corporations lack of response and inability to take action goes against all ethics and how the situation should have been handled.

Target Security Breach In mid 2013 Target Corporation hired a security firm, FireEye, to install a malware detection tool and monitor their network. This malware detection tool was estimated to cost around $1.6 million (Businessweek.com) and seemed like a step in the right direction of upgrading their system and keeping information safe. This move by Target Corporation was put in place to monitor their systems and help prevent customer information from being stolen. This new system would be

Similar Documents

Premium Essay

Ipad's Security Breach

...iPad’s Security Breach Samantha Phillips Dr. Prakash G. Menon BUS 508: The Business Enterprise May 29, 2011 Justifying Hacking into a Web site In 2010, McDonald’s said that customer information was exposed after a security breach involving an email marketing managing firm. McDonald’s released a statement explaining that information was obtained by an “unauthorized third party”, but added that financial information and social security numbers were not part of the data accidentally exposed. (Security Magazine, 2010) A security breach exposed iPad owners including dozens of CEOs, military officials, and top politicians. They, and every other buyer of the cellular-enabled tablet, were vulnerable to spam marketing and malicious hacking. The breach, which came just weeks after an Apple employee lost an iPhone prototype in a bar, exposed the most exclusive email list on the planet, a collection of early-adopter iPad 3G subscribers that includes thousands of A-listers in finance, politics and media, from New York Times Co. CEO Janet Robinson to Diane Sawyer of ABC News to Mayor Michael Bloomberg. It even appears that White House Chief of Staff Rahm Emanuel's information was compromised. In fact, it is believed 114,000 user accounts were compromised, although it's possible that confidential information about every iPad 3G owner in the U.S. has been exposed. (Tate, 2010) Earlier this year, the names and e-mails of customers of Citigroup Inc. and other large U.S. companies...

Words: 3288 - Pages: 14

Premium Essay

Cybersecurity

...EXECUTIVE SUMMARY This paper details the importance of cyber security in the face of evolving cyber threats and the ever-increasing attacks on government and businesses alike. We live in a globally connected world and globally distributed cyber threats. Not restricted by geographical boundaries these threats target all technologies, service providers, and consumers. The threats are at an all-time high, in terms of sophistication and volume, and continue to trend upwards. WHAT IS CYBERSECURITY? Twenty years ago businesses did not think twice about cyber security. In a world of mainframes and dumb terminals with no connectivity to anything outside, viruses, malware, and hacking was unheard of, however, with the introduction of the Internet things have now changed. The term cyber security is getting more and more mixed usage lately, so much so that it is almost as ambiguous as the term "cloud". Cyber security, referred to as information technology security, is the focus on protecting computers, networks, programs, and data from unintended or unauthorized access, change, or destruction. Cyber security also encompasses ten different security domains. The following domains provide a foundation for security practices and principles: • Access Control - to maintain information confidentiality, integrity, and availability, it is important to control access to information. Access controls prevent unauthorized users from retrieving, using, or altering information. They are...

Words: 1611 - Pages: 7

Premium Essay

Jet Copies Case Problem

...“IPad’s” Security Breach BUS 508: Contemporary Business August 16, 2011 Strayer University Dr. Robert L. Kight Assignment 4: iPad’s Security Breach This document will attempt to discuss hacking into a Web site. Is it ever justifiable? The document will create a corporate ethics statement for a computer security firm that would allow or even encourage activities like hacking. The document will discuss whether it is important for organizations like Gawker Media to be socially responsible. It will determine factors CEOs should consider when responding to a security breach. Finally, it will create an email script to be sent to AT&T customers informing them of the security breach and a plan to resolve the issue and state the rationale. Apply your theory to a real-world case in which someone hacked into a system, including the name of the company and details. As I attempt to discuss this assignment, I could not avoid thinking about the age-old opinion that Apple products were unique, and that they were protected against criminal encroachments. As such, Apple became one of the hottest technological innovations in the industry. Today, like most other such technology, Apple is becoming increasingly vulnerable to intrusion. It is becoming a medium for posing threats to an entire corporate network as well as devices for official and unofficial use. My answer to this question is twofold. In other words qualification of any kind for such conduct must be based...

Words: 1981 - Pages: 8

Premium Essay

Donta'

...iPad’s Security Breach Samuel D. Brown Dr. Daniel Frost Contemporary Business - BUS508013VA016-1116-001 August 21, 2011 Security and ethical issues has become very common over the past couple years. Recently we have seen an increase in e-crime. Boone and Kurtz (2011) states that “Computers provide efficient ways for employees to share information. But they may also allow people with more malicious intentions to access information. Companies may install firewalls, use encryption software, and passwords. But as fast as software developers invent new and more elaborate protective measures, hackers seem to break through their defenses. Thus, security is an ongoing battle” (pg. 509). A great example of this is the group call “Anonymous”. They have successfully hacked into a number of companies and government agencies. They also have plans to takedown or hack in to the most popular social website, Facebook. Determine if hacking into a Website is ever justifiable, applying your theory to a real-world case in which someone hacked into a system, including the name of the company and details. Over the years we have heard of individuals hacking into computers, but in the last couple of years we are seeing more and more websites being hacked into. If an individual can get convicted and arrested for breaking into a department store and taking complete control of it or even robbing a store or department store a person that hacks into a company’s website should get the same treatment...

Words: 2401 - Pages: 10

Free Essay

Ethics in Business

...ETHICS IN FINANCE Meaning of Ethics Ethics is the study of human behavior which is right or wrong. In general, ethics means doing right things to others, being honest to others, being fair and justice to others. Even ethics in finance is a compartment to general ethics. Ethics are very important to maintain constancy in social life, where people work together with one another. In the process of social development we should not be conscious of ourselves but also conscious to take care of others. WHAT IS FINANCE Finance means fund or other financial resources; it deals with matter related to money and the market. The field of finance refers to the concept of time, money and risk and how they are interrelated. Banks are the main facilitators of funding. Funding means asset in the form of money Finance is the set of activities that deals with the management of funds. It helps in making the decision like how to use the collected fund. It is also art and science of determining if the funds of an organization are being used in a right manner or not. Through financial analysis, any company or business can take decision in making financial investments, acquisition of company, selling of company, to know the financial standing of their business in present, past and future. It helps to stay competitive with others in making strategic financial decisions. Finance is the backbone of business; no business can run without finance. WHAT IS ETHICS IN FINANCE Ethics in finance...

Words: 1891 - Pages: 8

Premium Essay

Internal and External Factors Mgt/230

...Internal and External Factors Jantae K. Jackson MGT/230 May 25, 2015 William Roman Internal and External Factors In any given organization or business, the role of management includes planning, organizing, controlling, and leading (Bateman, T. S & Snell, S. A., 2011). Based on position, each member of management within a business or organization, is required to perform different duties and posses different responsibilities. Nevertheless, in order for a manager to be effective at any level of management, it is important for him or her to understand both internal and external factors and how both factors affect the establishment in which he or she works for. Functions of Management Planning is identifying goals to be achieved and deciding, in advance, on the actions necessary to achieve these goals (Bateman, T. S & Snell, S. A., 2011). This function of management combines a business or organization's objective, mission, goal and vision. Organizing is coordinating the financial, informational, physical, and human resources needed to achieve a company or organization's goal. The purpose of this function is to provide a way in which all people and things can work hand-in-hand an be successful (Bateman, T. S & Snell, S. A., 2011). Third is leading. Leading is encouraging people to perform to the greatest of their ability. This function serves as a motivator, guide and helper to employees. Due to the fact that success is not guaranteed even after planning...

Words: 1553 - Pages: 7

Premium Essay

Cybercrime Law, Regulation, Effects on Innovation

...Cybercrime Law, Regulation, Effects on Innovation Human Aspects in Cybersecurity: Ethics, Legal Issues, and Psychology CSEC 620 9024 Summer Semester May 18, 2015 Table of Contents Introduction 1 The Role of the Government in Protecting National Security 1 Acceptance of Government Intervention on Protecting National Security 2 Reaction to the Security Intervention on the Private Sector 3 Impacts/Effects of Government Regulations to Private Industries 4 Compliance Measures to Protect National Security 5 Responsibility to Protect National Security 5 Conclusion 6 Introduction Government has the responsibility to protect its national security and citizen. This could be done by providing policies and procedural guidance to private industries. This relationship between government and private industry are not conflict immune as the balance between protecting the national interest and invading privacy is in question. Senior management from the private industry caught in between making the right decision to protect their customer or investing in cyber security. This research paper covers the impact of government regulations, security laws, and legal concepts on the private sector to protect national security and its interpretation and acceptance by the public. The Role of the Government in Protecting National Security The US government invested a lot to protect its critical infrastructure from cyberattack by creating and implementing policies...

Words: 1899 - Pages: 8

Premium Essay

Applied Research Project

...PROJECT MISCELLANEOUS: * Computer Ethics * Virtual Reality * Multimedia * Telecommuting * Data Security * International Issues * Computer Based-learning After reviewing several options for my discussion, I decided that exploring a publishing company, Design Space Media Group, LLC would be an excellent and diversified approach to the many miscellaneous aspects present within an organization. Design Space Media Group began publishing 7 years ago as a Chicago based Architectural Publication, and shortly after, expanded to several countries around the world. As the company cultivated its publications into several multimedia developments, Tranzit Magazine, a lifestyles by-product was launched along with several other new ventures. There were certain challenges that came with expanding, and the organization would have to adjust in order to thrive in a rather competitive, yet questionable economy. Computer Ethics According to Kenneth C. Laudon and Jane P. Laudon “Ethics refers to the principles of right and wrong that individuals, acting as free moral agents, use to make choices to guide their behaviors”. Computer ethics is set of moral principles that regulate the use of computers. With these simple moral principles, there are some common problems of computer ethics that includes intellectual property rights such as copyrighted electronic content, privacy concerns, child abuse, fraud and how computers affect society. For example, while...

Words: 2070 - Pages: 9

Premium Essay

Strategic Initiatice Papaer

...Strategic Initiative Paper – Target FIN/370 Strategic Initiative In general, the Target Corporation’s overall strategic plan is to improve the relevance and reliability of its customer experience across multiple channels (in-store, online, mobile and social media), as well as preserve, grow and leverage the Target name and maintain a reputation of satisfying customer needs. Consistent with the overall strategy, Target Corporations plan for 2013, involved a number of strategic initiatives to improve long long-term growth. Included in the initiatives is investments in technology, the opening of 17 new stores, the expansion of store base facilitates to effectively penetrate into its target markets to gain a competitive advantage over its competitors. While looking at expansion opportunities in international markets such as Canada and Latin America through the use of smaller-format stores called City Target. (Target's Strategic Initiatives, 2013). The focus of this paper will be Target Corporations technology initiative. Technology Strategic Planning Initiative As noted above, Target Corp. 2013 annual report discusses several strategic initiatives one of which relates to technology. Target Corp. relies on a computer system to manage inventory, process guest transactions, manage guest data, communicate with vendors and other third parties, service REDcard accounts and summarize and analyze results of operations ("Target Corporation" 2013). Target Corp. business is becoming...

Words: 1211 - Pages: 5

Free Essay

E-Sonic

...protect the company’s many threats from a poor company image and possible law suits. Technology has become a very positive element for efficiency and multitasking and has also created new threats such as identity theft, computer viruses, unethical behavior, and data security breaches. Human Resource has the responsibility to set company standards and enforce policies to protect the company, employees, and customers. As technology advances, so does the element to manipulate data and records. A plan to set company policy in regards to incoming, sent, and deleted emails should be set. Communication to all employees should be the first step to inform them of the company’s intent to enforce data protection. Training and development should be available and scheduled for all employees. These training sessions should be evaluated for value and areas for improvement. Training sessions should include explanations of the dangers and risks of how company can be impacted. Once employees understand the “why”, they are less likely to complain about personal privacy or freedom of speech. Focal points of training and communication should include What is important data, Do’s and Don’ts of internal company information, no tolerance policy for discarding important documents or computer information, and protection of employees and customer personal information. Expectations and consequences...

Words: 882 - Pages: 4

Premium Essay

Business Law

...consists of Watches, Jewelry and Sunglasses. My Target market is Women of all ages and sizes. In the entity of business My Company will have Copyrights, Trademarks, and a Domain name II. Formation The formation I rather use is an LLC- it is a Hybrid form of Business enterprisenwhich means I can facilitate my business as a new developer and I can learn to build my brand from it. Since I have no partners it is a good entity which also offers the Tax advantages of a partnership. If I was to have $500.00 I am registering my Domain name for 99 cents and getting my Business License for $200.00 which is for the application plus 1$65.00 for a licensing fee as well as trademarking my brand, which is $69.00 which gives me a total of $434.99. III. Contracts/Employment Law/Agency My company will enter a contract with consumers and consignees (Buyer and seller) The contract I will apply towards my business is Sale or Return and Implied in fact, agreements with customers and sellers. There are many risks associated with my contracts, one being the Extinct contract, which is “a promise for an act” I can only make a promise if the goods are sold. And as long as the goods are 100% authentic, I can resell them. It is also a risk to the seller if their Goods cannot /was not sold. When I do decide to hire an employee/employees, there will be an agreement contract between the two (employer and employee). Understanding the Code of Ethics and making an offer on wages, and understanding...

Words: 868 - Pages: 4

Premium Essay

Cloud Computing

...spread in the same manner as wildfire, uniting citizens around the world with such topics as war and human rights. We live in a society in which technology has shaped the people that we are today. Most students in middle or high school have had access to a cellular phone since their birth. Beyond the surface of technology being used as a device to interact with one another, technology is used as a device to store information. Our society has transformed from storing information on a hard drive or a flash drive to the information being stored on the Internet via the concept of cloud computing. Cloud computing is the act in which information can be stored and reviewed over the Internet rather than stored on a drive. The information on these computers is secured by a third party organization. It optimizes using fewer machines to get more work done efficiently. The idea of cloud computing was first formulated in the 1960’s, but has become a more popular term in more recent years. But with every form or new wave of technology, cloud computing has been met with praise, as well as...

Words: 3023 - Pages: 13

Premium Essay

Information Technology

...planning for disaster recovery. Ethics, Privacy, and Information Security LEARNING OBJECTIVES rain_c03_070-121hr.qxd 28-09-2009 11:25 Page 71 WEB RESOURCES Student Web site www.wiley.com/college/rainer • Web quizzes • Lecture slides in PowerPoint • Author podcasts • Interactive Case: Ruby’s Club assignments WileyPLUS • All of the above and... • E-book • Manager Videos • Vocabulary flash cards • Pre- and post-lecture quizzes • Microsoft Office 2007 lab manual and projects • How-to animations for Microsoft Office • Additional cases CHAPTER OUTLINE 3.1 Ethical Issues 3.2 Threats to Information Security 3.3 Protecting Information Resources What’s in IT for me? ACC FIN MKT OM HRM MIS rain_c03_070-121hr.qxd 28-09-2009 11:25 Page 72 72 Chapter 3 Ethics, Privacy, and Information Security Opening Case NASA Loses Secret Information for Years The Business Problem Over the past decade, U.S. government agencies have been the victims of an unprecedented number of cyber-attacks. One government official noted, “It is espionage on a massive scale.” Government agencies reported almost 13,000 security incidents to the U.S. Homeland Security Department during fiscal year 2008, triple the number from two years earlier. The National Aeronautics and Space Administration (NASA) (www.nasa.gov) is one of the hardest-hit agencies. The government agency responsible for the nation’s public space program, NASA, has been the target of cyber-espionage dating back...

Words: 25389 - Pages: 102

Free Essay

New Employee Orientation

...New Employee Orientation “The new employee orientation process begins before the employee comes to work. Planning ahead for your new employee’s arrival will allow you to spend productive time on that first day (University of California, Berkeley, a).  According to Berkeley, the following items are of importance: “make a copy of the job description and your department’s organization chart, make sure the employee’s work location is available, clean, and organized; make sure a copy of the appropriate personnel policy manual or contract is available for the employee, have a benefits information package available, put together a list of key people the employee should meet and interview to get a broader understand of their roles, and arrange for a building pass, parking pass, and IDs if necessary” (University of California, Berkeley, b). The first day on a new job incorporates excitement along with fear and stress. Therefore, it is important to make each new employee feel welcomed. The manager or supervisor should be the first to greet the new employee and offer a “warm welcome” to the company (University of California, Berkeley, b).  If possible, a welcome sign should be placed at the entrance to the employee area so all staff at that location will know that a new person is starting and be able to welcome them warmly as well. Next, the manager on site, or the Human Resource manager if the hiring is at headquarters, should walk the employee through any necessary forms...

Words: 2863 - Pages: 12

Premium Essay

Student

...TUTORIAL 4 1. What information is provided or issues raised by the video on the slide titled “A.C.S. – Video 1” in the “Australian Computer Society Code of Conduct” lecture? Information and Communication Technology (ICT) is an industry profession of change, expansion, and investment. In Australia the heart of ICT is Australian Computer Society (ACS) that helps in building professional development and support to helping and developing a better and modern future. 2. What are the objectives of the A.C.S.? The objectives of ACS are on providing national focus to IT artificial intelligence and to promote more-n-more use of these in the industry, business, and government sectors so also equally raise a public level of informed comment on the intelligence to the issues. It is also to maintained and promote the ACS code of ethics, and extend the knowledge of intelligence and explain the benefits of being an ACS member. 3. What is the A.C.S. Code of Ethics? The ACS by the code of ethics requires its member’s to follow certain rules and guideline that are a set of values and ideals that uphold the honors, dignity, and its effectiveness of the information Technology . 4. What is its relevance to the I.T. Manager? The IT Manager’s need to be loyal to the company they work for, and also look into the various interest of their staff and the interest of the well being of their company clients and decisions needs to be taken by the manager according to that. He also...

Words: 2717 - Pages: 11