Week 5 Assignment

docx

School

Strayer University *

*We aren’t endorsed by this school

Course

560

Subject

Information Systems

Date

Dec 6, 2023

Type

docx

Pages

4

Uploaded by MinisterBravery12894

Report
Fairbanks, Joshua 10/31/2023 CIS560001VA016-1238-001 Week 5 Assignment Point-of-Sale (POS) Attacks It seems that Cheddar's Scratch Kitchen experienced unauthorized access to guest data from November 3, 2017, to January 2, 2018. This means that during that time, someone accessed guest information without permission. The unauthorized access to guest data at Cheddar's Scratch Kitchen may have had various impacts on the business. This might include personal details like names, contact information, and possibly even payment card data. In the statement from August of 2018, they believed that payment card information, including card numbers from guest that visted between November 3 rd 2017 and January 2 nd 2018 would have been effected and had data accessed without authorization, this led to an estimated exposure of around 567,000 payment card numbers. It could have led to a loss of customer trust and reputation, potential legal consequences, and financial costs associated with investigating and addressing the breach. Additionally, the company may have had to implement enhanced security measures to prevent future incidents. It's unfortunate when businesses experience breaches, but it's important for them to take steps to mitigate the effects and protect their customers. Cheddar's Scratch Kitchen would likely have taken steps to investigate the breach, notify affected customers, and enhance their security measures to prevent future incidents. It's always important for businesses to prioritize the security and privacy of their customers' data.
In 2018, Adidas experienced a data breach that affected its customers. The breach exposed personal information, including contact details and usernames, data like email addresses, login credentials, and encrypted passwords. However, financial data was not affected. Adidas promptly took immediate action and addressed the issues and encouraged customers to change their passwords as a precautionary measure. They also enhanced their security measures to prevent future incidents. The common purpose of attacks on POS systems is to gain unauthorized access to sensitive information, such as credit card data or personal information, for financial gain. The response to these attacks typically involves investigating the breach, mitigating the damage, and enhancing security measures to prevent future incidents. It's important for businesses to prioritize cybersecurity and take steps to protect customer data. POS systems have become prime targets for hacking groups due to the valuable data they store, such as credit card information and the potential financial gain they could access. Hackers exploit vulnerabilities to gain unauthorized access and steal this sensitive data for financial gain, such as vulnerabilities like weak passwords, outdated software, or lack of security measures. The stolen data can be sold on the dark web or used for fraudulent activities. The widespread use of POS systems in various industries makes them attractive targets. Businesses should prioritize cybersecurity measures to safeguard customer information and prevent such attacks. Businesses must stay vigilant, regularly update their systems, use strong passwords, and implement security measures to protect against these attacks. It's always better to be proactive in ensuring the security of customer data. Let's examine the forensic challenges in investigating POS systems. Some challenges include identifying and preserving digital evidence, as POS systems generate large amounts of
transactional data. Retrieving and analyzing this data can be complex, especially if it's encrypted or deleted. Additionally, determining the point of entry and tracing the hacker's activities can be difficult due to the interconnected nature of networks. However, with proper forensic techniques and tools, investigators can piece together the evidence to identify the perpetrators and strengthen security measures. When investigating POS systems, forensic challenges can include the need to collect and analyze large amounts of transactional data, which can be time- consuming and require specialized tools. Additionally, POS systems often have complex network configurations, making it challenging to determine the source of an attack or track the hacker's activities. Encryption and data deletion can also hinder forensic investigations. However, skilled forensic experts can overcome these challenges by employing advanced techniques and tools to uncover evidence and identify the culprits.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Works Cited https://www.businessinsider.com/data-breaches-2018-4#adidas-3 https://www.prnewswire.com/news-releases/notice-of-unauthorized-access-to-cheddars-scratch- kitchen-guest-data-300701161.html https://www.businessinsider.com/adidas-warns-customers-potential-data-breach-2018-6