{[ promptMessage ]}

Bookmark it

{[ promptMessage ]}

Chapter 13 - :( Else,(v.1.4.For...

Info iconThis preview shows pages 1–3. Sign up to view the full content.

View Full Document Right Arrow Icon
Previous Chapter Next Chapter This is “Information Security: Barbarians at the Gateway (and Just About Everywhere Else)”, chapter 13 from the book Getting the Most Out of Information Systems (v. 1.4). For details on it (including licensing), click here . For more information on the source of this book, or why it is available for free, please see the project's home page . You can browse or download additional books there. To download a .zip file containing this book to use offline, simply click here . Has this book helped you? Consider passing it on: Help Creative Commons Creative Commons supports free culture from music to education. Their licenses helped make this book available to you. Help a Public School DonorsChoose.org helps people like you help teachers fund their classroom projects, from art supplies to books to calculators. Table of Contents Chapter 13 Information Security: Barbarians at the Gateway (and Just About Everywhere Else) 13.1 Introduction LEARNING OBJECTIVES 1. Recognize that information security breaches are on the rise. 2. Understand the potentially damaging impact of security breaches. 3. Recognize that information security must be made a top organizational priority.
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Sitting in the parking lot of a Minneapolis Marshalls, a hacker armed with a laptop and a telescope- shaped antenna infiltrated the store’s network via an insecure Wi-Fi base station.Particular thanks goes to my Boston College colleague, Professor Sam Ransbotham, whose advice, guidance, and suggestions were invaluable in creating this chapter. Any errors or omissions are entirely my own. The attack launched what would become a billion-dollar-plus nightmare scenario for TJX, the parent of retail chains that include Marshalls, Home Goods, and T. J. Maxx. Over a period of several months, the hacker and his gang stole at least 45.7 million credit and debit card numbers and pilfered driver’s licenses and other private information from an additional 450,000 customers.E. Mills, “Attacks on Sony, Others, Show It’s Open Hacking Season,” CNET , June 8, 2011. TJX, at the time a $17.5 billion Fortune 500 firm, was left reeling from the incident. The attack deeply damaged the firm’s reputation. It burdened customers and banking partners with the time and cost of reissuing credit cards. And TJX suffered under settlement costs, payouts from court- imposed restitution, legal fees, and more. The firm estimated that it spent more than $150 million to correct security problems and settle with consumers affected by the breach, and that was just the tip of the iceberg. Estimates peg TJX’s overall losses from this incident at between $1.35 billion and $4.5 billion.A. Matwyshyn, Harboring Data: Information Security, Law, and the Corporation (Palo Alto, CA: Stanford University Press, 2009).
Background image of page 2
Image of page 3
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}