The Home Depot Data Breach Case Study

1138 Words3 Pages

Case Study: The Home Depot Data Breach Dinesh Somala A00146897

Summary

This case study is about the data breach that had taken place in the home depot in 2014
Where in 56 million payment cards were stolen and the issues related to the occurrence.
Nowadays, hacking systems which get the data from payment card in retail stores is a popular issue. The use of stolen third-party vendor credentials and RAM scraping malwares were the main reasons for the data breach. A brief introduction of when and how the Home Depot’s data breach took place and how the home depot reacted to the issue and rectified it by …show more content…

On the off chance that Home Depot had a defencelessness management program, performing monthly vulnerability scans of the POS environment; they could have utilized the consequences of those outputs to show leadership the significance of the gaps in that environment and possibly started to mitigate the risk of that environment before the breach occurred.

For an in-depth defence approach, case study provides a series of things that describe about what is working nowadays for a secure data.
1. Updating the POS devices to a current, supported operating system is a must.
2. Ensure you have up-to-date antivirus software with HIPS capability.
3. You need to have automatic updates activated on the POS devices.
4. You need to enable P2P encryption on the POS devices.
5. The thing that you will need to implement is the disabling of all unnecessary ports and services on the POS devices.

The networking-based countermeasures that need to be implemented are:
1. You need to segregate the POS network from your corporate network.
2. Once you have segregated the POS network, you need to apply rules on the networking device responsible for the …show more content…

As we can see now-a-days, there are many replacements to card payments such as MOBILE PAYMENT options like Apple and Samsung Pay. Recently, Apple has launched finger print (TOUCH ID) payment option in its new Mac-book Pro. Almost every application has its own wallet to pay. But still, as we know that technology is any day not secured. It might not be vulnerable today. But, we cannot predict its non-vulnerability because one day or the other, it becomes vulnerable to any type of attack.
There are many ways to prevent data breaches and the research is still going on how to prevent Data Breaches as we know that technology is always vulnerable. The most important prevention measures to Data Breaches are:
1) CONTENT FILTERING: Which is to verify downloads whether they are malicious and proceed to download. This is simple and will yield good

Open Document