logo

CJ 4472 - Cyber Security Breaches - Case Study

   

Added on  2020-03-01

9 Pages2593 Words39 Views
Running head: CYBER SECURITY BREACHES 1Cyber security breachesNameInstitutionProfessorCourseDate
CJ 4472 - Cyber Security Breaches - Case Study_1
CYBER SECURITY BREACHES 2Part A.California Association of Realtors cyber securityIntroductionOn July 2017 a California Real Estate Business Service (REBS) was at the center of databreach where it lost very sensitive information from its customers. REBS has online paymentsystem helps the organization in selling its real estate products such as software, forms, blankhome sales contracts and classes. The payment system was infected with malware which wasbelieved to be active in the system up May 15 2017 when it was recognized by one of thecustomer and reported the instance (Robbins, 2017). Malware target was to extract someinformation when user of the system made their payment. Customers’ personal information wasbeing copied by the malware to a third party who could then use information for personal gain.Some of the information that was lost by the company include; credit card numbers and creditcard expiry date, user names, home addresses and transaction verification code. The hackergained access to California Association of Realtors (CAR) by affiliating themselves toAssociation of Realtors (AOR) website. In the data breach, it was estimated that over 1,000members users’ information had been fraudulently accessed. Despite having installed themalware and virus protection software, hackers were still able to get access to the system andcopy some sensitive information.Similarly, an extensive analysis of the problem shows how the system was poorlyprotected. If the company had invested heavily on security of its system, it would be difficult forthe hackers to bypass security features that were in place. Due to lack of strong security features,customers’ credit card numbers and their security codes were stolen. Stolen information was
CJ 4472 - Cyber Security Breaches - Case Study_2
CYBER SECURITY BREACHES 3used by hackers to bill fraudulent charges to customers once they used their cards on the REBSwebsite for payments. Therefore, the main issues in this case are security of the system andlosses that REBS might have suffered as a result of security breach (Olenick et al, 2017). As aresult of the security lapse, it is now evident how organization has made its customers’ sufferfinancial losses which should have been prevented. If REBS case is not well handled, suchscenario might end up repeating itself hence compromising integrity of the organization. Theproblem which faced REBS can mainly be attributed to technological hitches that were eitherpoor or not properly implemented to secure organizational information. Since its very clearsystem security has been a major problem, organization did not put security alerts on the systemto make sure in case of any problem, either the customer or the company gets a notification. Nature of occurrenceThe REBS data breach occurred through a hacker installing a malware on the paymentsystem which helped in collecting personal information which was later used to defraudcustomers. By installing some malware on the payment system, hackers were able to collectinformation and send it to a third party. Through Association of Realtors (AOR) website, hackermanaged to infiltrate and get access to REBS system. Once required information was collected, itbecome possible for hackers to start charging customers unrealistic arrears from their credit cardsonce they made payment through REBS payment system. The main reason of the attack was toget information which could later help in siphoning some cash from innocent customers withouttheir knowledge (Spacek, 2017). The other main reason for the attacker might be to compromiseintegrity of the company where another company would benefit by attracting customers from thelatter. By damaging image of a competitor, the beneficiary gains a lot because some of thecustomers form the competitor might end up acquiring services from the other company.
CJ 4472 - Cyber Security Breaches - Case Study_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Report on Information Security
|10
|2036
|86

Case Study: The Home Depot Data Breach
|7
|1152
|186

ASSIGNMENT WHAT IS CYBER CRIME ?
|8
|1982
|28

Target Data Breach: Threats, Protections, and Legal/Ethical Issues
|8
|1725
|99

Cyber Security Management Assignment 2022
|11
|2597
|18

Report on Information System Security
|5
|760
|60