Week 5 Assignment
.docx
keyboard_arrow_up
School
Strayer University *
*We aren’t endorsed by this school
Course
560
Subject
Information Systems
Date
Dec 6, 2023
Type
docx
Pages
4
Uploaded by MinisterBravery12894
Fairbanks, Joshua
10/31/2023
CIS560001VA016-1238-001
Week 5 Assignment
Point-of-Sale (POS) Attacks
It seems that Cheddar's Scratch Kitchen experienced unauthorized access to guest data
from November 3, 2017, to January 2, 2018. This means that during that time, someone accessed
guest information without permission.
The unauthorized access to guest data at Cheddar's
Scratch Kitchen may have had various impacts on the business. This might include personal
details like names, contact information, and possibly even payment card data. In the statement
from August of 2018, they believed that payment card information, including card numbers from
guest that visted between November 3
rd
2017 and January 2
nd
2018 would have been effected and
had data accessed without authorization, this led to an estimated exposure of around 567,000
payment card numbers. It could have led to a loss of customer trust and reputation, potential
legal consequences, and financial costs associated with investigating and addressing the breach.
Additionally, the company may have had to implement enhanced security measures to prevent
future incidents. It's unfortunate when businesses experience breaches, but it's important for them
to take steps to mitigate the effects and protect their customers. Cheddar's Scratch Kitchen would
likely have taken steps to investigate the breach, notify affected customers, and enhance their
security measures to prevent future incidents. It's always important for businesses to prioritize
the security and privacy of their customers' data.
In 2018, Adidas experienced a data breach that affected its customers. The breach
exposed personal information, including contact details and usernames, data like email
addresses, login credentials, and encrypted passwords. However, financial data was not affected.
Adidas promptly took immediate action and addressed the issues and encouraged customers to
change their passwords as a precautionary measure. They also enhanced their security measures
to prevent future incidents.
The common purpose of attacks on POS systems is to gain unauthorized access to
sensitive information, such as credit card data or personal information, for financial gain. The
response to these attacks typically involves investigating the breach, mitigating the damage, and
enhancing security measures to prevent future incidents. It's important for businesses to prioritize
cybersecurity and take steps to protect customer data. POS systems have become prime targets
for hacking groups due to the valuable data they store, such as credit card information and the
potential financial gain they could access. Hackers exploit vulnerabilities to gain unauthorized
access and steal this sensitive data for financial gain, such as vulnerabilities like weak passwords,
outdated software, or lack of security measures. The stolen data can be sold on the dark web or
used for fraudulent activities. The widespread use of POS systems in various industries makes
them attractive targets. Businesses should prioritize cybersecurity measures to safeguard
customer information and prevent such attacks. Businesses must stay vigilant, regularly update
their systems, use strong passwords, and implement security measures to protect against these
attacks. It's always better to be proactive in ensuring the security of customer data.
Let's examine the forensic challenges in investigating POS systems. Some challenges
include identifying and preserving digital evidence, as POS systems generate large amounts of
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help