Verified Document

Credit Card And Software Essay

Related Topics:

Cybercrime Prevention The fate of Target when it comes to cybercrime is fairly well known. They hit the headlines for all the wrong reasons when their customers' credit card information was exploited during a holiday season in recent years. Given that and given the ominous and ever-present threat of cybercrime, this brief report shall serve as a good guideline to help prevent cybercrime events and damages, or at least mitigate them. The lessons learned from Target's own breach are on full display in this report but there are other real-world lessons, events and principles that should also be considered and remembered.

Best Practices

Invest in Software & Hardware

• Do not go cheap or cut corners on hardware

• Do not go cheap or cut corners on software

• Make sure all software is fully functional and licensed

• Ensure uptime of all systems is as close to 100% as possible

• Use modern and state of the art hardware and software

• Avoid using wireless internet when at all possible

• NEVER use wireless internet to transmit credit card/sales information

• NEVER use WEP wireless encryption (has been hacked) -- only enterprise level WPA, WPA2 or something similar (Ou, 2007).

• Update software and hardware periodically so as to keep on the cutting edge.

• Do smaller incremental updates rather than huge...

jumps
• More like once every year or two rather than every five years or more

Invest in People

• Make sure to staff the information technology/security department as much as is needed to ensure security

• Do not run a skeleton crew at any time

• Make sure the people hired and staffed know what they are doing

• Degrees

• Certifications

• Proven prior experience

Adhere to Best Practices & Procedures

• Network should be monitored for cyberattacks and anomalous activity at all times

• Keep credit card and other sensitive information in the most secure part of the servers

• Only people with "right to know" should have ANY access to those servers

• All employees with network access should have PRECISELY the access they need

• Nothing beyond that

• Nothing short of it

• Must be able to do job but not access things that they don't need to meddle with or see

• Vendors access should also be controlled carefully (Winter, 2014)

• Access only to what they need to do their job

• Keep integrated in the system so that both vendors and Target have access

• Conduct periodic penetration testing to see how good the current security is (BSIMM, 2017)

• Keep up…

Sources used in this document:
References

BSIMM. (2017). Penetration Testing Types & Remediation. bsimm.com. Retrieved 5 June 2017, from https://www.bsimm.com/framework/deployment/penetration-testing/

Ou, G. (2007). TJX's failure to secure Wi-Fi could cost $1B | ZDNet. ZDNet. Retrieved 5 June 2017, from http://www.zdnet.com/article/tjxs-failure-to-secure-wi-fi-could-cost-1b/

Winter, M. (2014). Home Depot hackers used vendor log-on to steal data, e-mails. USA TODAY. Retrieved 5 June 2017, from https://www.usatoday.com/story/money/business/2014/11/06/home-depot-hackers-stolen-data/18613167/
Cite this Document:
Copy Bibliography Citation

Related Documents

Software Engineering
Words: 2030 Length: 7 Document Type: Term Paper

Software Engineering Outline requirements for a Supermarket Checkout System -- The checkout system in a supermarket consists of a store computer to which the cash registers are connected. Each cash register is equipped with its own processor, a keypad with numeric keys and function keys, an electronic barcode scanner, a scale, a customer order receipt printer, a credit/debit card reader, a credit/debit card receipt printer and a display where item and

Software Testing Strategy
Words: 8852 Length: 24 Document Type: Term Paper

Software Testing Strategy Computers and their applications have brought about waves of changes in various areas of science and technology. It is also gaining widespread prominence in the field of business and management. So the requirement of a quality oriented technological implementation, having a range of usage is the order of the day. The few gazillion dollars worth software industry is constantly evolving with the needs of people and organizations across

Marketing Plan for a New Software Application.
Words: 818 Length: 3 Document Type: Essay

marketing plan for a new software application. The software works by gathering purchase information from consumers via their credit and debit card purchases, and then generating a list of anticipated future purchases. This will then be used by our company to sell targeted ads to these consumers. The software works in a manner that is actually quite similar to the way that websites like Amazon, Booking.com, Facebook and Trip

Smart Health Card Role in Rational of Medicines Use
Words: 919 Length: 3 Document Type: Essay

Smart Card Health Role in Rational Use of Medicines The objective of this study is to examine the role of smart cared in health and their role in the rational use of medicines. Smart cards are very small and very secure and serve to protect patient privacy. Smart cards contain digital logs with location, date, time, and the individual's stamp to record every transaction. Smart cards also may contain digital prescriptions

Real Estate Appraisal Software the
Words: 596 Length: 2 Document Type: Term Paper

In addition to its report-writing software, it says it had the first case management, automated mapping systems and digital image management software. It is the first appraisal software company to be certified as AI-Ready by the Appraisal Institute Residential Database (AIRD). That does not necessarily mean the software is easy to use and cost-effective, but a look at the integrated components of its software suite and relatively reasonable prices give

Hardware and Software Integrity
Words: 580 Length: 2 Document Type: Case Study

IBM Case Study In hardware security, the absence of right techniques and equipments increases the risk and chances of failure. In business, it is rarely a great thing. However, all companies must take risks every now and then in cases where they have to explore new avenues of success. They appreciate secure and firm foundations that can minimize those threats. In technology deployment, the extent of security must be persistent. When

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now