Reservation system of starwood hotels

Assignment Help Basic Computer Science
Reference no: EM133017967

Beginning in 2014, malware infected the reservation system of Starwood Hotels, which included Sheraton, W Hotels, Westin, Le Meridien, Four Points by Sheraton, Aloft and St. Regis. Then, in 2016, Marriott Hotels acquired Starwood. In November 2018, Marriott discovered and revealed the four-year hacking campaign that attacked Starwood's reservation database. A total of 383 million guests were eventually determined to have been affected. The data breach related in the theft of names, addresses, phone numbers, credit card information, email addresses, and millions of unencrypted passport numbers. The Data Breach has arguably subjected Starwood to legal liability both in the US (data breach and breach notification laws) and in the EU (the EU General Data Protection Regulation -GDPR). In your initial post, please answer both of the following questions:

Choosing either a US state data breach law or the EU GDPR (check our reading materials and PowerPoint slides, the links below, and ncsl.org for descriptions of applicable law) and explain how it applies or has already been applied to Starwood for its data security breach.

Using your best judgment, what would you recommend to create and maintain an infrastructure that would most robustly and effectively protect against future breaches and the liabilities resulting from those breaches? Include any specifics you may be familiar with such as hardware and software recommendations, compliance with specific US and international laws, industry best practices, and any appropriate third-party vendor solutions.

Reference no: EM133017967

Questions Cloud

Advantages and disadvantages of type of testing : Discuss the advantages and disadvantages of each type of testing. When is each type of testing appropriate?
Positively influence behaviors in organization : Identify and explain three IT leadership models and how each can positively influence behaviors in an organization.
How ibm new organization structure contributes to strategy : Carefully read and review the case study assigned for this term: Bivins, S. S. (2014). A transformational change at IBM. Paper presented at PMI® Global Congress
Monitoring and enforcement mechanisms in place to restrict : Explain the penalty(ies) that can be imposed on a manager by the monitoring and enforcement mechanisms in place to restrict such activity.
Reservation system of starwood hotels : Malware infected the reservation system of Starwood Hotels, which included Sheraton, W Hotels, Westin, Le Meridien, Four Points by Sheraton
Does the internet of things discriminate : Does the Internet of Things Discriminate? Support your answer with an example.
Foundation of creating a good leadership base : What is the foundation of creating a good leadership base?
What is the after-tax cost of debt : The bond currently sells for 96% of its face value. The company's tax rate is 20%. Assume the par value of the bond is $1,000. What is after-tax cost of debt
Understand the importance of a safari business goals : Please be thorough in this exercise. Please understand the importance of a safari business's goals, mission, and vision.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  What is the maximum daily profit

If the profit on Model 28 is $100 and on Model 74 is $60, how many of each model should be assembled each day to provide maximum profit?

  Servant-leaders in disciplines and communities

It is priority that students are provided with strong educational programs and courses that allow them to be servant-leaders in disciplines and communities

  Application to display a multiplication table similar

Code the application to display a multiplication table similar to the one shown in Figure 6-31 (Zak, 2016). Use the For...Next statement in the btnForNext_Click procedure, and use the Do...Loop statement in the btnDoLoop_Click procedure. Test the a..

  Should a router ever advertise reachability

Should a router that uses BGP to advertise routes treat the set of routes advertised differently than the set of routes in the local routing table?

  Calculate how many disk i/o operations are required

Consider a file currently consisting of 100 blocks. Assume that the filecontrol block (and the index block, in the case of indexed allocation) is already in memory.

  Why should an organization implement an erm application

Why should an organization Implement an ERM application? What are some key challenges and solutions to Implementing an ERM? What is Important for an effective

  Find the price of a call option struck at zero

There are no interest rates. An asset is worth zero today and goes up or down by 1 each day. Find the price of a call option struck at zero as a function of the number of steps to expiry.

  Data base security

Write an essay discussing sqlmap, an automated tool for sql injection and database takeover. Discussing the Safe Harbor provisions under HIPAA.

  What is the smallest integer n such that the complete graph

What is the smallest integer n such that the complete graph on n vertices, Kn, has at least 500 edges? Show all of your work.

  Supports the company business and processes

Create a schema that supports the company's business and processes. Illustrate the flow of data including both inputs and outputs for the use of data warehouse.

  Analyze asymmetric and symmetric encryption

Analyze asymmetric and symmetric encryption. Evaluate the differences between the two of them and which one that you would determine is the most secure

  Build a graphical representation of a web-based input

build a graphical representation of a Web-based input for making a hotel reservation

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd