Week 5 Assignment

.docx

School

Strayer University *

*We aren’t endorsed by this school

Course

560

Subject

Information Systems

Date

Dec 6, 2023

Type

docx

Pages

4

Uploaded by MinisterBravery12894

Fairbanks, Joshua 10/31/2023 CIS560001VA016-1238-001 Week 5 Assignment Point-of-Sale (POS) Attacks It seems that Cheddar's Scratch Kitchen experienced unauthorized access to guest data from November 3, 2017, to January 2, 2018. This means that during that time, someone accessed guest information without permission. The unauthorized access to guest data at Cheddar's Scratch Kitchen may have had various impacts on the business. This might include personal details like names, contact information, and possibly even payment card data. In the statement from August of 2018, they believed that payment card information, including card numbers from guest that visted between November 3 rd 2017 and January 2 nd 2018 would have been effected and had data accessed without authorization, this led to an estimated exposure of around 567,000 payment card numbers. It could have led to a loss of customer trust and reputation, potential legal consequences, and financial costs associated with investigating and addressing the breach. Additionally, the company may have had to implement enhanced security measures to prevent future incidents. It's unfortunate when businesses experience breaches, but it's important for them to take steps to mitigate the effects and protect their customers. Cheddar's Scratch Kitchen would likely have taken steps to investigate the breach, notify affected customers, and enhance their security measures to prevent future incidents. It's always important for businesses to prioritize the security and privacy of their customers' data.
In 2018, Adidas experienced a data breach that affected its customers. The breach exposed personal information, including contact details and usernames, data like email addresses, login credentials, and encrypted passwords. However, financial data was not affected. Adidas promptly took immediate action and addressed the issues and encouraged customers to change their passwords as a precautionary measure. They also enhanced their security measures to prevent future incidents. The common purpose of attacks on POS systems is to gain unauthorized access to sensitive information, such as credit card data or personal information, for financial gain. The response to these attacks typically involves investigating the breach, mitigating the damage, and enhancing security measures to prevent future incidents. It's important for businesses to prioritize cybersecurity and take steps to protect customer data. POS systems have become prime targets for hacking groups due to the valuable data they store, such as credit card information and the potential financial gain they could access. Hackers exploit vulnerabilities to gain unauthorized access and steal this sensitive data for financial gain, such as vulnerabilities like weak passwords, outdated software, or lack of security measures. The stolen data can be sold on the dark web or used for fraudulent activities. The widespread use of POS systems in various industries makes them attractive targets. Businesses should prioritize cybersecurity measures to safeguard customer information and prevent such attacks. Businesses must stay vigilant, regularly update their systems, use strong passwords, and implement security measures to protect against these attacks. It's always better to be proactive in ensuring the security of customer data. Let's examine the forensic challenges in investigating POS systems. Some challenges include identifying and preserving digital evidence, as POS systems generate large amounts of
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help