Wednesday, May 6, 2020

The Biggest Risk Of Data Theft Lies Within A Company s...

The biggest risk of data theft lies within a company s customers. When security breaches happen, the customer begins to question if Sunoco has looked out for their personal information and overall trust becomes an issue. Whenever someone purchases with a credit card, the customer is putting their trust in Sunoco that the information will not fall into the wrong hands. If Sunoco does not handle the situation quickly and efficiently after it occurrs, panic ensues by current and potential customers. Credit cards are a huge portion of sales today. According to Javelin Strategy Research, â€Å"plastic cards purchases comprised 66 percent of all in-person sales, with nearly half of them, or 31 percent, made with debit cards. Last year shoppers used credit cards for 29 percent of point-of-sale purchases; it is expected that the numbers will rise to 33 percent by 2017† (New, 2012, para. 5). That leaves potential for a significant loss in sales and annual earnings. With the increase o f credit and debt card usage, Sunoco needs to take the necessary action to ensure that data theft does not occur again for their customers. In order for Sunoco to avoid the consequences and risks of a data breach, security systems must be updated on a frequent basis and implemented when they become available. Heavier monitoring of the Point of Sale system (POS) that the customers have available at the gas pump should also be implemented. After the Target credit card breach, the Department of Homeland ofShow MoreRelatedUnethical Computer Issues1912 Words   |  8 Pagesdo everything from work related projects to managing financial transactions and accounts online. While technology has made our lives more convenient than ever before, cyber crime, in various forms, has become one of our biggest concerns. It is a crime to misuse another person s whether personal or financial information, without their consent, for fraudulent activities. Information such as social security numbers, credit history, and PIN numbers is often acquired through the unlawful access to informationRead MoreThe Darknet, Inside The Digital Underworld1860 Words   |  8 Pagesvarious subcultures go to take part in mostly illegal activities without getting caught. Some of these sites are used to access child pornography, (Attwood, 2010) and some of them sell illegal drugs. People can do whatever they want even if it s illegal without getting arrested. The main issue that the author is addressing is that the Darknet may provide a place for people to go on the internet and engage in child pornography and drug trafficking outside of the law but many of the thingsRead MoreOrganizational Fraud9733 Words   |  39 Pagessystem red flags 12 3.6.5. Financial performance red flags 12 4. ESSENTIALS OF ORGANIZATIONAL FRAUD 12 4.1 Detection 13 5. SATYAM SCANDAL 14 5.1 Lessons for HR Professionals 14 5.2 Lessons for India Companies 15 6. ORGANISATIONAL EMPOWERMENT 16 7. RISK OF FRAUD IS LESSENED IN EMPOWERED ORGANIZATION 16 8. IMPACT OF FRAUD 16 8.1 Macroview – Impact on Organization 16 8.2 Microview – Impact on employees not involved in fraud 17 9. ORGANIZATIONAL LEADERSHIP 17 Read MoreThe Pros and Cons of Cloud Computing3785 Words   |  16 Pagessuccessful company in the private usage of a file-cloud, since 2007 it has acquired over 50 million users (Dropbox 2012). The success of Dropbox lies more in its simplicity rather than its functionality, the company never uses words like sync or cloud, it simply works for the user (Carr 2011). But would business also use cloud services? If we take Dropbox as an example, would a firm use a similar service and upload files on a foreign server, hence give away files to a different company? Even whenRead MoreThe Security Of A Bank Transaction, Online Shopping Or Booking Flight Tickets On Our Mobile App8041 Words   |  33 Pagesphenomenal. Moreover, the present, ever expanding, inculcation of digital technology has accommodated, within its premise, a further lag in analyzing the consequential stakes. A common practice of espionage targets both banking institution as well as its customers. Strikingly, the frontier between the different security threats are fuzzy, either due to the complexity of domain or the ever-increasing customer base. The banks are governed by some regulations and policies, yet it does have a scope for theRead MoreA Critical Evaluation of Amazon’s Strategy, Strategic Choices, Structure, Systems and Culture7541 Words   |  31 Pages | Amazon.com A critical evaluation of Amazon’s strategy, strategic choices, structure, systems and culture Authored by: L. Gounden, C. Hendrikz, R. Ligault, M. Louw, P. Mathopa, A. Omer, S. Patamadai V. Pillay Date: September 22, 2008 TABLE OF CONTENTS 1 Introduction 5 2 Q1. STRATEGY 5 2.1 THE EXTERNAL ENVIRONMENT 6 2.1.1 MACRO ENVIRONMENT 6 2.1.2 Industry environment 9 2.1.3 CompetitiveRead MoreElectronic Commerce As Defined By Salvatore2622 Words   |  11 Pagesand from business to consumer through the Internet† (p. 150). Consequently, e-commerce is now essential for businesses to be able to compete in the global marketplace. â€Å"E-commerce is now being used in all types of business, including manufacturing companies, retail stores, and service firms. E-commerce has made business processes more reliable and efficient† (Smith, K.T., 2011, p.3). this paper will outline those perspectives in regards to the origin of E-commerce, Business to Business E-commerce, BusinessRead MoreFrauds in Insurance11958 Words   |  48 PagesInsurance is one of the tools for risk management that aims at reducing the risk on the day-to-day life of individuals, organisation and society. At the same time, it should also be appreciated that insurance cannot be utilised as a risk free tool for all types of situations. Insurance provides risk management solutions to many situations that fall within the competence of human judgement and managerial skills. Insurance is very important in today’s world there are number risk which people face in theirRead MoreThe Future of Our Money Essay examples2433 Words   |  10 Pagesintrinsic value to conduct our business; today, we use paper currency, which is convenient and easy to carry around. But slowly, we are moving into the digital age of money, an age in which less of our money is actually tangible and more of it is just data on a computer server. To some, this prospect may seem daunting. However, given the major advantages of electronic money over outmoded paper counterpart, society as a whole should embrace the upcoming era of digital money. Digital money is undeniablyRead MoreThe University Of Arizon Electrical And Computer Engineering7879 Words   |  32 Pagesprotection from Rogue Aps, here are some attacks that can be laugh through the Rogue AP: †¢ Attack on wired network infrastructure †¢ Mapping the Network for target attacks †¢ Scanning hosts or network for target attacks †¢ Man in the middle attack and data sniffing on network. I.2. Homograph attack Security Ninja which is a blog for security research news and guidance on network describes the internationalized domain name (IDN) homograph attack as a way a malicious party may deceive computer

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.