Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

In August 2008, 11 people were charged with the theft of more than 40 million credit and debit card numbers from T.J. Maxx, Marshalls, Barnes

In August 2008, 11 people were charged with the theft of more than 40 million credit and debit card numbers from T.J. Maxx, Marshalls, Barnes & Noble, OfficeMax, and other major retailers. Masterminded by computer hacker Albert Gonzalez, the case remains one of the largest frauds of credit card information in history. The Heartland case was similar to the TJX case. Between 2007 and 2009, the data breach involved the Heartland Payment Systems, the fifth largest credit card processor in the United States. During that time, Gonzalez and co-conspirators gained access to information associated with millions of credit cards by exploiting a network vulnerability. Both casesHeartland and TJXinvolved the theft of over 130 million credit and debit card numbers, making it the biggest computer crime case ever prosecuted in the United States. Question: you are the CISO of a Fortune 500 company here in the U.S. Your company uses customer credit card information to process millions or orders every year, both online and via traditional marketplace venues. you have information that based on recent Equifax breaches, your secure database has been breached and customer credit card data may have been stolen.

You are meeting with a Digital Forensics investigator who has been hired to access incidents and report back to you with their findings. Detail the following:

1. Needs for the DF investigation -- why did you bring in the investigator?

2. The forensic process you want followed, including data collection (detail possible sources of data), examination, analysis, and reporting.

3. List and describe the type(s) of information and it's relevance to this case from each of the following: data and data files, Operating Systems (Windows 10, WIN Server '12, and Ubuntu Linux), network traffic, applications, and eMail and services.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image_step_2

Step: 3

blur-text-image_step3

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Machine Learning And Knowledge Discovery In Databases European Conference Ecml Pkdd 2017 Skopje Macedonia September 18 22 2017 Proceedings Part 3 Lnai 10536

Authors: Yasemin Altun ,Kamalika Das ,Taneli Mielikainen ,Donato Malerba ,Jerzy Stefanowski ,Jesse Read ,Marinka Zitnik ,Michelangelo Ceci ,Saso Dzeroski

1st Edition

ISBN: 3319712721, 978-3319712727

More Books

Students also viewed these Databases questions

Question

3. Importance of employee development.

Answered: 1 week ago

Question

1. Who should participate and how will participants be recruited?

Answered: 1 week ago

Question

3. How would this philosophy fit in your organization?

Answered: 1 week ago

Question

How would you assess the value of an approach like this?

Answered: 1 week ago