Verified Document

Global Payments Hack With The New Advancements Essay

Global Payments Hack With the new advancements of technology comes the many risks and dangers is also carries along. The evolution of the internet and connect-ability technology has brought everyone closer and has nearly eliminated many communication barriers that have been present throughout recorded history. These new advances have also accompanied a rise in cyber criminals, wishing to invade a person's or business' digital information. The purpose of this essay is to examine computer hacking and hacking processes that pose risks and dangers to society. The essay will use the company Global Payments as an example of how a hacking problems effects many and highlights the dangers involved in our digital world.

This essay will view Global Payments and their hacking problem from a third party accounting system point-of-view. The company's security assessment will be analyzed and different software issues will be discussed. Finally the essay will conclude by offering recommendations to Global Payments to best secure their systems and assets from hackers.

Background Information on Global Payments

In late March of 2012, the company Global Payments was hacked into causing much damage and trouble for the financial security of many individuals and groups. Sidel & Johnson (2012) reported about the confusing mess this breach of security had left. They stated that "The breach underscores the mazelike network of the U.S. payment system, where little-known companies play important roles in processing billions of transactions each day. Global Payments is part of a group of companies called "third-party processors," that serve as middlemen between merchants and banks. "

As time grew on last year, more and more people began to realize that they were at risk of having their credit card information being unlawfully used. To understand the scope of Global Payments and the reach they had on many consumers is to understand the threat of hackers and hacking in these types of situations.

According to its website, Global Payments mission statement is as follows; " we strive to provide the most trusted payment service n the world through strong partnerships and generous...

" They do this by being one of the world's larges electronic transaction processing companies in the world. Global payments also provides comprehensive business to business payment card and processing services such as cash management, financial electronic data interchange, management information and reporting services.
The Breach and the Aftermath

The news that Global Payments was breached was released in late March 2012 and many reactions were noted. The breach itself occurred between the dates of 21 January and 25 February. It took nearly a month for the public to become aware of what had happened at just who was at risk from having their personal financial information hacked. Both Visa and Master Card, customers of Global Payments, issued statements to their own customers about the breach and that there may be some security issues involved with some data.

An estimated 1.5 million accounts were exposed in this breach of security, but some estimated the size of the problem closer to 7 million accounts. Pepitone (2012) claimed that "Global Payments released a statement, saying that while more than 1 million card numbers may have been compromised, cardholder names, addresses and Social Security numbers were not affected. That's a sizeable breach, but it's far less than the worst-case-scenario numbers flying around and it affects just a small fraction of the estimated 1 billion debit and credit cards in circulation in the U.S. "

The final results of the breach were released by Global Payments in mid April 2013. Kitten (2013) reported that "it is closing its investigation of a data breach it discovered in March 2012 that exposed an estimated 1.5 million U.S. debit and credit cards. The company also reports that a breach-related class-action lawsuit filed in April 2012 was dismissed March 6. The lawsuit claimed the processor had failed to maintain reasonable and adequate procedures to protect cardholders' personally identifiable information." In its earnings report for the quarter ended Feb. 28, the company says its network and systems have been confirmed compliant and secure, and that all lingering expenses linked…

Sources used in this document:
References

Dignan, L. (2012). Cost of Global Payments hack likely manageable. CNet, 1 April, 2013. Retrieved from http://news.cnet.com/8301-1009_3-57407787-83/cost-of-global- payments-hack-likely-manageable/

Dubois, S. (2011). What it actually takes to prevent a hack attack. CNN, 11 July 2011. Retrieved from http://management.fortune.cnn.com/2011/07/11/what-it-actually-takes-to- prevent-a-hack-attack/

Global Payments Website. Viewed 1 May 2013. Retrieved from http://www.globalpaymentsinc.com/USA/productsServices/index.html

Kitten, T. (2013). Global Closes Breach Investigation. Bank Info Security, 15 April 2013. Retrieved from http://www.bankinfosecurity.com/global-closes-breach-investigation-a- 5684
Pepitone, J. (2012). 1.5 million card numbers at risk from hack. CNN Money, 3 April, 2012. Retrieved from http://money.cnn.com/2012/04/02/technology/global-payments- breach/index.htm
Sidel, R. & Johnson, A. (2012). Data Breach Sparks Worry. Wall Street Journal, 30 March 2012. Retrieved from http://online.wsj.com/article/SB10001424052702303816504577313411294908868.html
Cite this Document:
Copy Bibliography Citation

Related Documents

Computer Fraud and Abuse Act
Words: 2541 Length: 7 Document Type: Term Paper

Computer Fraud and Abuse Act Information technology and related systems provide multiple benefits to business, government, and individual users. Databases, Internet transactions, and emails contain sensitive customers, employee and operations data that are extremely vulnerable. The following study focuses on various components of IT and related systems used for the storage of information like computers, servers, and website databases. Whilst identifying the ways the date can be compromised and exposed to

Website for Freelancer
Words: 6848 Length: 25 Document Type: Business Plan

Business Plan for Freelancer Website Business Plan for Freelance Website Freelancer website is a platform where freelance writers, researchers, designers, and other freelancers meet the clients and complete their projects against pre-decided compensation. The business plan constitutes an analysis of the business operations, business environment, financial appraisal, and marketing strategies of a company. The business plan presented in this paper discusses all these elements in the light of research papers, books, and

Banking in the 1899 Case of Austen
Words: 3517 Length: 10 Document Type: Essay

Banking In the 1899 case of Austen v United States Bank 174, the Supreme Court defined a bank in the following words: "A bank is an institution, usually incorporated with power to issue its promissory notes intended to circulate as money (known as bank notes); or to receive the money of others on general deposit, to form a joint fund that shall be used by the institution, for its own benefit,

Promising Phenomenon That Lends Itself
Words: 26560 Length: 96 Document Type: Dissertation

66). Furthermore, social software will only increase in importance in helping organizations maintain and manage their domains of knowledge and information. When networks are enabled and flourish, their value to all users and to the organization increases as well. That increase in value is typically nonlinear, where some additions yield more than proportionate values to the organization (McCluskey and Korobow, 2009). Some of the key characteristics of social software applications

Security Issues of Online Communities
Words: 15576 Length: 60 Document Type: Term Paper

This researcher rejects the existence of online communities because computer mediated group discussions cannot possibly meet this definition. Weinreich's view is that anyone with even a basic knowledge of sociology understands that information exchange in no way constitutes a community. For a cyber-place with an associated computer mediated group to be labeled as a virtual settlement it is necessary for it to meet a minimum set of conditions. These are:

Ommerce E-Commerce E- Commerce E- Commerce E-Commerce
Words: 4770 Length: 16 Document Type: Essay

OMMERCE E-Commerce E- Commerce E- Commerce E-commerce revolution has immensely affected all the industries, including the real estate industry. By using websites the real estate agents can transmit the information about the properties to a wide range of people. In addition to that, it can also enable the real estate agents to set up information communication channels directly between the real estate agencies, investors and developers. By mass media advertisements, the retailers can target

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now