Preview

Technology and Risks

Good Essays
Open Document
Open Document
775 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Technology and Risks
Technology and Risks
It is no coincidence we end this class discussing the same topic be began with, technology and risks.
When technology constantly evolving, it is becoming increasingly difficult to keep confidential info safe. As consumers, we protect our PC with virus protection and malware, we make sure to block our Wi-Fi to keep intruders out and of course we never share our information over the internet.
Most consumers are wary of using their credit or debit cards on the internet in fear of their information being stolen; because of this some consumers steer clear of internet transactions. Yet, these same consumers have no problem handing a credit or debit card to a stranger in a brick and mortar establishment. Somehow, consumers feel safer and secure with their information in someone else’s hands.
Data theft is not limited to consumers; there have been numerous reports of security breaches within major cooperations. It is almost impossible to think a large company can be a victim of hacking. The truth of the matter is in 2000 major companies such as H & R Block, E-Trade and Western Union all had their information systems hacked exposing the personal information of its customers. (Greenstein, 2002) In 2013, Target became the latest victim of a security breach, compromising the personal information of over 100 million customers. This breach was very costly to the company, it is estimated that the company lost over 100 million dollars, had a 46% drop in revenue and forced the CEO to step down. (Krebs, 2014) I guess one could ask the question, “Exactly how are these systems being breached?” Some may think there is a single cynical person sitting alone in the dark trying to take over the world by stealing the world’s personal information. The fact of the matter is these systems are compromised in various fashions.
Malware and Malicious Websites: Malware and malicious websites are specifically designed with viruses to sabotage a company or



References: Greenstein, M., & Vasarhelyi, M. (2002). Chapter 7: Risks of Insecure Systems. In Electronic commerce: Security, risk management, and control (2nd ed.). Boston: McGraw-Hill/Irwin. Krebs, B. (2014, May 6). Krebs on Security. Retrieved March 11, 2015, from http://krebsonsecurity.com/2014/05/the-target-breach-by-the-numbers

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Cybercrime is on the rise. As companies try to protect their customers PII, criminals are trying to get it. Ponemon Institute did a survey of how the information was affecting larger companies (Institute, 2014). Unfortunately the hackers are using the information to ruin their credit. Russian hackers obtained 1.2 billion usernames and passwords (Institute, 2014).…

    • 276 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 1 Assignment 2

    • 313 Words
    • 2 Pages

    Identity theft occurs in some of the largest companies and often times this security breach is kept quiet. This company has been hacked for customer’s birthdates twice in one month. This means that they are experiencing severe vulnerabilities and they need to take action immediately. When customers start hearing that the companies they deal with have had security breaches in their computer systems data, they panic and most tend to, discontinue associating with that particular company.…

    • 313 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    There are various types of electronic categories for the e-commerce system. The most popular type of electronic payment is the digital wallet. By using the digital wallet for paying purchases over the web more efficiently and by eliminating the need repeated information for each purchase. The digital wallet is more secure, and the owner’s information is saved automatically when the information is completed for a purchase. For example; the consumer would not have repeat credit-card information each time they purchase something. Example: Google Checkout.…

    • 679 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Choicepoint Data Breach

    • 865 Words
    • 4 Pages

    ChoicePoint, A data broker, suffered a data breach in 2005. This breach led to the disclosure of thousands of people’s personal information. We will discuss the type of breach this would fall under, how it occurred, the losses of confidentiality, integrity, and availability (C.I.A.), and the types of improvements ChoicePoint could or did undertake to help prevent this from happening again.…

    • 865 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Data breaches and cyber-attack frequency has dramatically increased in recent years, with the advancement of technology and the prevalence of more “cloud” storage and remote access servers. In Mr. Horton’s article, he remarks on the high cost a data breach can have on both finances and a company’s reputation. (Horton, 2014) Citing the Ponemon Institute’s 2013 Cost of a Data Breach Study, Horton goes on to state that “data breaches can cost an average organization more than $5 million per incident.” (Ponemon Institute, 2013)…

    • 499 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    The theft of the records was caused by installing malware on the orgaznization's point of sales systems. These systems were used via third party vendors and had various security issues. This was the reason the hackers were able to break into their systems. The file that contained all the records started taking rounds in the market and was being sold in black. These records were then used to steal money from customer's accounts. There were several fake cards made and identity theft took place. The details were stolen from Faziio Mechanical. The malware was then sent to all the employees in an email. There was a possibility that Citadel malware, a program that steals passwords, was involved.…

    • 588 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Cmgt 400 Week 2

    • 1100 Words
    • 3 Pages

    The internet is approximately 40 years old and is continuing to grow at a rapid pace. This rapid growth and use of the internet for practically everything you can do in life has also cause a major increase in threats. Cyber-criminals are often breaking into security on many major websites and making the news. Information Security is turning into an important part in protect a business’s information.…

    • 1100 Words
    • 3 Pages
    Better Essays
  • Good Essays

    Toward the end of the 1940s, Soviet researchers sealed five prison inmates in an airtight chamber and dosed them with an experimental stimulant gas to test the effects of prolonged sleep deprivation. Their behavior was observed via two-way mirrors and their conversations monitored electronically. They were promised their freedom if they could go without sleep for 30 days.…

    • 803 Words
    • 4 Pages
    Good Essays
  • Good Essays

    It/205 Dq 1

    • 369 Words
    • 2 Pages

    Organizations must ensure the security and control of systems and transactions with clients and vendors. What security breaches may cause harm to an organization or its clients? Why is it important to ensure a proper level of security? What tools are available to prevent breaches?…

    • 369 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    In the late of 2013, we start hearing the scandal that our customers’ personal information is leaking. The customer private information including customer’s name, phone number, home address, and even credit card information. Our customers entered their private information when purchasing our products online at target.com, and registering for our loyal reward card REDcard. According to the latest customer survey in United States, there are around 189.4 million digital shoppers in 2013 and will be expected 210.2 million digital shoppers in 2017 (Statista, 2014). From the feedback in stores, about 20% customers use REDcard to pay for their purchase…

    • 2317 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    IS 4560 Week 1

    • 309 Words
    • 2 Pages

    Data breaches that could lead to identity theft, by sector - the danger of data breaches are of particular importance for organizations that store and manage large amounts of personal information. Not only can compromises that result in the loss of personal data undermine customer and institutional confidence, result in costly damage to an organization’s reputation, and result in identity theft that may be costly for individuals to recover from, they can also be financially debilitating to organizations.…

    • 309 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Despite the fact that there are numerous state and federal reporting agencies, an incredible amount of businesses and regular personal computer users do not report incidents. Among businesses, specifically, ninety percent of cyber crime goes unreported while only two percent of those that are reported end in a conviction. Because businesses have so much of the population 's personal information, and their validity depends on the consumer 's ability to depend on and trust the business, the businesses find a larger risk in revealing that their computer systems are susceptible breaching than the actual loss from a cyber attack. Succinctly, the economic loss from consumer 's mistrust would create a financial loss more damaging than the cyber attack…

    • 1568 Words
    • 6 Pages
    Powerful Essays
  • Best Essays

    5. Goessl, L. (2012). Op-Ed: Nissan recently hacked, corporate hacking a growing issue. Available: http://digitaljournal.com/article/323723. Last accessed 30th July 2013.…

    • 1963 Words
    • 8 Pages
    Best Essays
  • Good Essays

    Role of Federal Agencies

    • 802 Words
    • 4 Pages

    The recent security breach by unauthorized intruders into the parent company of NASDAQ is an example of the kind of breaches directed against important financial infrastructure and illustrates the difficulty of determining clear attribution. As we would in response to any such breach, the FBI is working to identify the scope of the intrusion and assist the victim in the remediation process.…

    • 802 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Data Breach

    • 3998 Words
    • 16 Pages

    In today’s digital world, most Americans leave long electronic trails of private information wherever they go. But too often, that data is compromised. When they shop—whether online or at brick and mortar stores—retailers gain access to their credit card numbers. Medical institutions maintain patient records, which are increasingly electronic. Corporations store copious customer lists and employee Social Security numbers. These types of data frequently get loose. Hackers gain entry to improperly protected networks, thieves steal employee laptops or disgruntled workers pilfer company information.…

    • 3998 Words
    • 16 Pages
    Better Essays