Data center security is of increasing concern, with data breaches and cyber vulnerabilities more and more in the news headlines. Briefly talk about Target’s new data centers?Cyber Breach at Target
Target shoppers got an unwelcome holiday surprise in December 2013 when the news came out 40 million Target credit cards had been stolen by accessing data on point of sale (POS) systems. CEO of Target, Gregg Steinhafel, said in an interview that “there was malware installed on our point-of-sale registers.” With access to the POS system, the attackers would have access to all track data from customer credit and debit cards. That would expose all of the information encoded on the cards’ magnetic stripes, giving the attackers full account data customer name, credit card number, CVV number and (if it’s a debit card) the PIN.Target later revised that number to include private data and announced that up to 70-110 million customers’ data have been compromised. The breach transpired between November 27 and December 15th 2014. Over 11 GB of data was stolen. Target was made aware of this situation in mid-December when the U.S. Department of Justice informed the company that their system was being attacked. Target had received internal notifications prior to this date, but had failed to act.The problem that impacted up to 110 million Target customers during the holiday shopping season may have been because of an inexpensive “off-the-shelf” malware known as BlackPOS. At a high level, BlackPOS is a “virus” that manipulates the code on the POS device that allows a “screen scrape” of the data at card swipe. Even with end-to-end encryption, the brief moment in time of swipe to transfer could be captured through the malware code manipulation.Access to the system came from network credentials that were stolen from an HVAC provider based in Sharpsburg, Penn. Initial speculation was that this vendor was monitoring HVAC systems installed at Target facilities remotely via network connection and that this was the way hackers gained entry into Targets internal network. As it turned out, this was not the case. The compromised data connection was being used for “electronic billing, contract submissions and project management”, not monitoring of equipment. The network credentials were, in fact, gathered after the HVAC contractor’s employee fell victim to a phishing scheme attack and clicked on a malicious email.Target was not unprepared for the breach. Earlier that year, the company had installed malware detection software by computer security firm FireEye (high-profile FireEye customers include the CIA and Pentagon). The FireEye team in Bangalore, India monitored Target’s system around the clock, and reported the activity to Target’s security team based in Minneapolis, Minn.Exfiltration malware was installed on November 30, 2013 to move the stolen information out of the Target servers. These drop points were first staged around the U.S., then to computers in Russia. It was at this point that the Bangalore team became aware that something was wrong and notified the Target security team in Minneapolis. For reasons that are unclear, Target’s Minneapolis team failed to act on the alert, allowing customer information to be compromised.The initial reports on this story attracted the attention of many in the construction industry. Although, in this case, access to Target’s credit card system did not come through HVAC unit, that scenario is not an improbable one. Remote monitoring of HVAC equipment is possible and future security incidents are not unlikely.

 
. TODAY AND GET AN AMAZING DISCOUNT

The post Data center security is of increasing concern, with data breaches and cyber vulnerabilities more and more in the news headlines. Briefly talk about Target’s new data centers? Cyber Breach at Target appeared first on Term Paper Tutors.

 

"Is this question part of your assignment? We Can Help!"

Essay Writing Service