Target Data Breach (1)

.docx
School
Southern New Hampshire University**We aren't endorsed by this school
Course
CIS 1410
Subject
Information Systems
Date
Dec 22, 2024
Pages
7
Uploaded by Brittanygray3
Running head: Target Data Breach Gray 1IT-659-Q5209 Cyberlaw and Ethics 20TW5Target Data BreachBrittany GrayJuly 8, 2020Submitted To: Professor, Michael AdamsSouthern New Hampshire University College of Online and Continuing Education, Manchester, NHTable of Contents
Background image
Target Data Breach Gray 2Introduction3Cyber laws3-4Cybersecurity Principles4-5Application of Technology in Cyber Crimes5Conclusion6References7Cyberlaw and Cybersecurity Principles
Background image
Target Data Breach Gray 3IntroductionA few years ago, “Target paid an $18.5 million multistate settlement, the largest ever for a data breach, to resolve state investigations of the 2013 cyber-attack that affected more than 41 million of the company's customer payment card accounts” (McCoy, Kevin 2017). In addition, the investigation from thebreach determined that cyber attackers gained access to Target's computer gateway served through credentials stolen from a third-party vendor in Nov. 2013. “Using the credentials to exploit weaknesses in Target's system, the attackers gained access to a customer service database, installed malware on the system and captured full names, phone numbers, email addresses, payment card numbers, credit card verification codes, and other sensitive data” (McCoy, Kevin 2017). Not only did it affect 41 million customer payment card accounts, but it also affected contact information for more than 60 million people. In essence, technological digital migration has brought great advancement in the use of digital devices to transfer digital data through the use of internets. The new technology transformation has created a space for the cybercrimes to commit an illegal offense. There is a need to embrace new technologies to combat these offensive crimes. Also, there is a need to employ cyber laws to help control and detect any offensive crime. Besides, there is a need to use new technologies to ease the process of extracting evidence of a perpetrated crime for legal proceedings in the court. Arguably, cyber law and cybersecurity are the core principles to provide strategic guidance to protect and control systems and information from cyber threats.
Background image
Target Data Breach Gray 4Cyber lawsThe government implements cyber laws to protect individuals, organizations, businesses from cybercrimes. Health insurance is one of the laws amended to protect essential citizens’ information from being altered, modified, or hacked by victims of crime (Novak, 2019). The government implemented the act of facilitating accountability and portability, which helps to minimize frauds relating to well-being care. Besides, the law controls the abuse of electronic information billing. Therefore, the law ensures that all health information is protected and for confidentiality. Gramm leach Bliley was an act that was implemented for those banks that lend money. Inother words, the law was deployed for commercial leading banks that offer funds to individuals or other banks (Novak, 2019). Also, the laws were made to facilitate advice on finance. Finally, the law was amended to protect organizations that offer insurance covers to customers.National information safety management law was amended to protect information programs. This act of regulation helps adjust the advancement of technologies and information through innovation (Novak, 2019). Therefore, the law helps to track down any crime that may bechanneled through the network.Other minor cyber laws introduced by the government. Cybersecurity information sharing is an act of law that helps advance security when individuals share information (Novak, 2019; “Cyberlaw," n.d.). Also, cyber safety enhancement was an act of law that helps to strengthen the protection of research data. Finally, federal exchange data breach notification was an act amended to give warnings to persons for the tampered essential data.
Background image
Target Data Breach Gray 5Cybersecurity PrinciplesOn the contrary, the various organizations need to put up cybersecurity principles to manage their essential data. The organization should assign enough funds for expenditure on cybercrimes or attack (ACCA Global, n.d.). Also, the organization should identify their susceptible links that can be easily used by hackers. Besides, individuals need to play their role to expose their essential credentials to hackers through phishing.The organization should use secure systems to control crimes. The organization should use secure firewalls and gateways. Also, there is a need to configure all the systems using protected configuration (EDUCBA,2020). Besides, the organization should use malware software for protecting, controlling, and detecting attacks. Finally, all organizations should adoptpatch management practices.Application of Technology in Cyber CrimesDue to the new changing technology, organizations have come up with application strategies to detect any attack of essential organizational information. Various organizations haveadopted newly invented technologies from software industries that develop software applicationsto manage, control, and detect data breaches through the network (Iqbal & Alharbi, 2019). Artificial intelligence is being used by software industries to develop intelligent software capableof detecting unauthorized actions of essential data. Machine learning applications are used to ease the process of investigation of a committed crime of breaching data. The use of artificial intelligence in developing related intelligent applications has managed to control the problem and time for extracting evidence of a crime. Also, detecting applications developed using machine learning is capable of detecting future attacks hence securing organizational
Background image
Target Data Breach Gray 6information. Therefore, the application of artificial intelligence has eased cybercrimes and the time spent for investigation of the evidence for legal proceedings in the court.ConclusionIn conclusion, cyber law and cybersecurity are the core principles to provide strategicguidance to protect and control systems and information from cyber threats. The discussion hascritically shown that the government has implemented various laws to protect organizations fromhackers' attacks. Finally, the debate has portrayed different cybersecurity principles to manage,control, and detect any invasion into the digital systems.
Background image
Target Data Breach Gray 7ReferencesACCA Global. (n.d.). The key cybersecurity principles. Retrieved July 8, 2020, from, https://www.accaglobal.com/my/en/member/discover/cpd-articles/audit-assurance/the-key-cybersecurity-principles.htmlCyberlaw: Everything you need to know. (n.d.). Retrieved July 8, 2020, from, https://www.upcounsel.com/cyber-lawEDUCBA. (2020, April 17).Cybersecurity principles. Retrieved July 8, 2020, from, https://www.educba.com/cyber-security-principles/Iqbal, S., & Alharbi, S. (2019, December 17). Advancing Automation in Digital Forensic Investigations Using Machine Learning Forensics. Retrieved July 8, 2020, from, https://www.intechopen.com/online-first/advancing-automation-in-digital-forensic-investigations-using-machine-learning-forensicsMcCoy, Kevin. “Target to Pay $18.5M for 2013 Data Breach That Affected 41 Million Consumers.” USA Today, Gannett Satellite Information Network, 23 May 2017, www.usatoday.com/story/money/2017/05/23/target-pay-185m-2013-data-breach-affected-consumers/102063932/.Novak, M. C. (2019, November 20). Let's talk about cyberlaw: Crime, security, and legislation. Retrieved July 8, 2020, from, https://learn.g2.com/cyber-law
Background image