Skip to document

Security breach - BIT-200 assignment

BIT-200 assignment
Course

Introduction to Computer Technology (BIT-200)

394 Documents
Students shared 394 documents in this course
Academic year: 2020/2021
Uploaded by:
0followers
7Uploads
4upvotes

Comments

Please sign in or register to post comments.

Related Studylists

Computer

Preview text

02/14/

SECURITY BREACH AND

ACCEPTABLE USE POLICIES MACY’S

  1. Security: i. At Macy’s, employees look forward of looking after our customers and other employees. ii. Macy’s enforces a great practice and safety standards to assure a save environment place.

  2. Confidential data: i. There is no allowance to access confidential data or information without permission unless for any reason it is required. ii. Users might have any access to private information, and it is classified in the Macy’s Data classification policy.

  3. E-mail and communication: i. Use of email is not recommended and other messaging sources and it should never be transmitted in an unencrypted format. iii. Personal and users should pay attention to any suspicious email and its content and must not open any unknown attached information

  4. Passwords: i. Customers when they have access to the Macy’s WIFI, you have to make sure to not share your passwords with anyone iv. All passwords have to be a length of at least 10 characters with lower and upper cases, numbers, characters and

  5. Bring your own device (BYOD): i. Must check if the device has a software and hardware allowed to use the network. v. Make sure that your device is free of flash drivers or any malware and viruses before accessing the network.

  6. Guest access. i. All users must understand and follow our policy. vi. Suspicious report of any activity or violation of our policy would be reported through our managers team.

  7. Incident response.

i. IT security is a requirement in our property, and we should protect our visitors, customers and employees of any kind of cybervirus. vii. For any complain or support please contact the IT support team or a IT staff member.

1. Identify the business organization and summarize the security breach.

R/. Macy’s is a fashion business organization, a nation’s premier enterprise, which is looking forward to innovating and bring value to the customers, building great sales and profit. Has an average sells of $25 billion dollars and has 140,000 employees around their 680 department stores. Macy’s had a security breach on its system. A group of hackers found a way to get the Magecart code to the Macy’s website to get the customers card information located in the wallet and registrations from the macy’s system.

2. Discuss the impact of the security breach on the organization and its customers.

R/. This event occurred in October 2014, Macy’s discovered the security breach and saw that the attackers were getting the customer’s credit card and all their information, so macy’s had to alerted customers about the issue they were having. Customers, of course did not like it at all, their information and credit cards were exposed so they lost any kind of reliability with Macy’s and the sales and customer service went down. Also, for people who were buying online, the number of new accounts created to shop reduced incredibly because the attackers were targeted people who were doing checkouts online on the Macy’s website.

3. Discuss the legal and ethical issues that resulted from the security breach, as well as the impact of those issues on the organization and its customers.

R/. An ethical issue was that the attackers were acting wrong stealing information from not even the store, they were stealing the credit card’s information from innocent customers who were only buying stuff on a store. They work hard to get that income and then someone just hack a store and take it. A legal issue is the violation of privacy and confidential information thief. The authorities took part to find the hackers who broke into the Macy’s platform.

2

RESOURCES:

MACY’S WARNING CUSTOMERS OF SECURITY BREACH, BUSINESS

INSURANCE SAYS. (2018, JULY 10). THE FLY, 0.

“WORKPLACE SAFETY.” MACY'S, INC.,

WWW.MACYSINC/ABOUT/POLICIES/WORKPLACE-SAFETY.

4
Was this document helpful?

Security breach - BIT-200 assignment

Course: Introduction to Computer Technology (BIT-200)

394 Documents
Students shared 394 documents in this course
Was this document helpful?
02/14/2021
SECURITY BREACH AND
ACCEPTABLE USE POLICIES MACYS
1. Security:
i. At Macy’s, employees look forward of looking after our customers and other
employees.
ii. Macy’s enforces a great practice and safety standards to assure a save
environment place.
2. Confidential data:
i. There is no allowance to access confidential data or information without
permission unless for any reason it is required.
ii. Users might have any access to private information, and it is classified in the
Macy’s Data classification policy.
3. E-mail and communication:
i. Use of email is not recommended and other messaging sources and it should never
be transmitted in an unencrypted format.
iii. Personal and users should pay attention to any suspicious email and its content
and must not open any unknown attached information
4. Passwords:
i. Customers when they have access to the Macy’s WIFI, you have to make sure to not
share your passwords with anyone
iv. All passwords have to be a length of at least 10 characters with lower and upper
cases, numbers, characters and
5. Bring your own device (BYOD):
i. Must check if the device has a software and hardware allowed to use the network.
v. Make sure that your device is free of flash drivers or any malware and viruses
before accessing the network.
6. Guest access.
i. All users must understand and follow our policy.
vi. Suspicious report of any activity or violation of our policy would be reported
through our managers team.