Access Millions of academic & study documents

Chapters Summary Final

Content type
User Generated
Subject
Business
School
California State University - East Bay
Type
Homework
Showing Page:
1/7
Running head: CHAPTERS SUMMARY
Chapters Summary
Student Name
Institution Affiliations

Sign up to view the full document!

lock_open Sign Up
Showing Page:
2/7
CHAPTERS SUMMARY 2
Chapter 4: Network Security
The chapter begins with the description of a scenario in the Target breach, where they
announced that malicious individuals had stolen data from their systems. The attackers attacked
the Target system by downloading malware to almost all systems in their stores in America.
Thus, personal information of about 70 million customers from Target was stolen during the
attack. The theft of data did not begin with a direct attack on the Target system but with
mechanic services and Fazio that offered services to Target. The attackers may have sent a
phishing email to an employee, which tricked the employee into loading the malware into their
computer (Panko & Panko, 2015). Therefore, the malware got all the credentials and sent it back
to the system of the attackers, which they then used to access the server of Target.
The attackers monetized the data that was stolen from Target and sold the data to card
shops and counterfeiters, who then used the data to create fake credit cards. The cards were later
used to purchase high-end products and then resell the products. According to the author, it could
take years to understand the overall of damages the Target breach experience. The primary
victim of the breach was Target as manifested by decrease sales, declined profit, and payment for
lawsuits. The other victim included credit card users and retailers who purchased fraudulent
products (Panko & Panko, 2015). According to the author, the Target breach is not the only case
that involves stolen data as most firms have suffered the same predicament in the past. Thus,
cybercrime has been increasing explosively in the world, costing businesses more than $400
million every year.
The chapter mainly highlights the importance of networks that connects us to anything,
everywhere, and at any time. However, through the Target breach, the section shows how

Sign up to view the full document!

lock_open Sign Up
Showing Page:
3/7

Sign up to view the full document!

lock_open Sign Up
End of Preview - Want to read all 7 pages?
Access Now
Unformatted Attachment Preview
Running head: CHAPTERS SUMMARY Chapters Summary Student Name Institution Affiliations CHAPTERS SUMMARY 2 Chapter 4: Network Security The chapter begins with the description of a scenario in the Target breach, where they announced that malicious individuals had stolen data from their systems. The attackers attacked the Target system by downloading malware to almost all systems in their stores in America. Thus, personal information of about 70 million customers from Target was stolen during the attack. The theft of data did not begin with a direct attack on the Target system but with mechanic services and Fazio that offered services to Target. The attackers may have sent a phishing email to an employee, which tricked the employee into loading the malware into their computer (Panko & Panko, 2015). Therefore, the malware got all the credentials and sent it back to the system of the attackers, which they then used to access the server of Target. The attackers monetized the data that was stolen from Target and sold the data to card shops and counterfeiters, who then used the data to create fake credit cards. The cards were later used to purchase high-end products and then resell the products. According to the author, it could take years to understand the overall of damages the Target breach experience. The primary victim of the breach was Target as manifested by decrease sales, declined profit, and payment for lawsuits. The other victim included credit card users and retailers ...
Purchase document to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.
Studypool
4.7
Indeed
4.5
Sitejabber
4.4