Topic > Information Security: Data Breach in the Target…

Nowadays, information security is a vital part of a company to develop and maintain its information system. As technology becomes more advanced in terms of creation and use, the greater the threats a company's information system will face. A threat is a person or organization that tries to obtain or modify data illegally, without the permission and knowledge of the owner. Likewise, a vulnerability is an opportunity for threats to gain access to individual or organizational resources (Kroenke 309). Apparently a threat will gradually lead to the vulnerability of a company, Target Corporation is a concrete example of this. The data breach at Target Corporation, which exposed more than 110 million of its customers' personal and credit card information, appears to be related to a malware-laced email phishing cyberattack. With a data breach, a company could lose large sums of money to cover the incident. In other words, establishing strong information security is said to be one of the most important and challenging tasks that every company expects to keep its business intact. The type of attack Target Corp. encountered is most likely a malware infection. Malware infection is the most popular attack threat encountered by respondents. In the last ten years, 67.1% of all cases of cyber attacks occurred (Kroenke 315). The breach at Target Corp. occurred sometime before Thanksgiving 2013, when a group of European hackers installed malware into Target's security and payment system to " steal every credit card used in the company's 1,797 U.S. stores ( Riley, Elgin, Lawrence and Matlack) weeks, the malware invasion went unnoticed because it escaped all the antivirus protections Target had (H...... middle of paper......' purchases on the weekend before Christmas 2013 (Wahba, Phil and Finkle ). In order to reduce the likelihood of exposing this cyber risk, companies and individuals should have technical safeguards involving hardware and software. These technical safeguards include identification and authorization , encryption, firewall, malware protection and application design (Kroenke One should start protecting your security system by blocking and addressing some issues. When an antivirus program asks to install the latest updates, you must allow it to do so. The reason is that the program may understand what its problem is and try to solve this problem. Apart from constantly checking the security system, people should also limit access to those suspicious emails. Such emails may contain malware and malicious programs that could penetrate your security system.