Attackers were targeting card processing in eastern europe

Assignment Help Basic Computer Science
Reference no: EM132385392

Scenario: There was a surge of attacks on banks where the attackers were targeting card processing in Eastern Europe. Having penetrated the bank's infrastructure, criminals obtained access to card processing systems and transferred funds from multiple accounts. They also disabled antifraud systems that would ordinarily notify the bank of fraudulent transactions. Simultaneously, their accomplices were withdrawing cash from ATMs in another country.

The bank's infrastructure contained the following:

The company runs open-source database, e-mail, and web servers. Employees can access the network via desktop computers that are available in the main office or by using their personal devices. The main office uses the Wireless Encryption Privacy (WEP) Protocol to connect to its wireless network. When training at the main office, volunteers access the Internet via the wireless network. Passwords are not required to be changed, and some employees have been using the same access credentials since joining the organization. Although the employee handbook includes a policy on acceptable use and password maintenance, these policies have never been enforced and have not been updated in years. The employee handbook also states the organization's security goal to maintain the confidentiality, integrity, and accessibility of the customer data.

Identify at least 2 federal regulations violated and 2 industry-standard frameworks that address protecting PII to support your claims which address or cover how a bank is required to remain in compliance and provide examples from the case study.

Reference no: EM132385392

Questions Cloud

NIT5150 Advanced Object Oriented Programming Assignment : NIT5150 - Advanced Object Oriented Programming Assignment - Practical Assessment Help and Solution - Victoria University, Australia
What recommendations would you make for use of technology : What recommendations would you make for more sustainable use of your selected technology? How would these recommendations support the goals of sustainability?
What were your thoughts and opinions on the ethical issue : In 400-500 words, please share a time in your professional life where you observed an unethical situation. What were your thoughts and opinions on this ethical.
Bus 640 managerial economics assignment problem : BUS 640 Managerial Economics assignment help and solutions, Ashford University, assessment help - Sometimes, a bidder on a work contract may bid lower.
Attackers were targeting card processing in eastern europe : There was a surge of attacks on banks where the attackers were targeting card processing in Eastern Europe.
Critically analyse security tools and present their findings : critically analyse security tools and present their findings. The assignment provides an opportunity to work in a group and to achieve a joint objective
ITECH7406 Business Intelligence and Data Warehousing : ITECH7406 Business Intelligence and Data Warehousing, SEM2, 2019 Assignment Help and Solution - Federation University Australia - INDIVIDUAL ANALYTIC REPORT
How does breadtalk improve customer service : How does breadtalk improve customer service using social media? Write an analytic report to evaluate the challenges, performance.
Stages of the software engineering process : Develop components of the Software Specification and Design Documents discussed in lectures. Student groups should be formed by Session four

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd