Page 335 -
P. 335

334 Part Two  Information Technology Infrastructure


        TABLE 8.3  THE FIVE MOST EXPENSIVE DATA BREACHES

         DATA BREACH               DESCRIPTION
         U.S. Veterans Affairs Department  In 2006, the names, birth dates, and social security numbers of 17.5 million military veterans and
                                   personnel were stolen from a laptop that a Department of Veterans Affairs employee had taken home.
                                   The VA spent at least $25 million to run call centers, send out mailings, and pay for a year of a   credit-
                                   monitoring service for victims.
         Heartland Payment Systems  In 2008, criminals led by Miami hacker Albert Gonzales installed spying software on the computer network
                                   of Heartland Payment Systems, a payment processor based in Princeton, NJ, and stole the numbers of as
                                   many as 100 million credit and debit cards. Gonzales was sentenced in 2010 to 20 years in federal prison,
                                   and Heartland paid about $140 million in fines and settlements.
         TJX                       A 2007 data breach at TJX, the retailer that owns national chains including TJ Maxx and Marshalls, cost at
                                   least $250 million. Cyber criminals took more than 45 million credit and debit card numbers, some of
                                   which were used later to buy millions of dollars in electronics from Walmart and elsewhere. Albert
                                   Gonzales, who played a major role in the Heartland hack, was linked to this cyberattack as well.
         Epsilon                   In March 2011, hackers stole millions of names and e-mail addresses from the Epsilon e-mail marketing
                                   firm, which handles e-mail lists for major retailers and banks like Best Buy, JPMorgan, TiVo, and Walgreens.
                                   Costs could range from $100 million to $4 billion, depending on what happens to the stolen data, with
                                   most of the costs from losing customers due to a damaged reputation.
         Sony                      In April 2011, hackers obtained personal information, including credit, debit, and bank account numbers,
                                   from over 100 million PlayStation Network users and Sony Online Entertainment users. The breach could
                                   cost Sony and credit card issuers up to a total of $2 billion.





                                   “reasonable”  security procedures to keep the data secure and to notify anyone
                                   affected by a data breach, but it has not been enacted.

                                   Click Fraud
                                   When you click on an ad displayed by a search engine, the advertiser typically
                                   pays a fee for each click, which is supposed to direct potential buyers to its
                                   products. Click fraud occurs when an individual or computer program fraudu-
                                   lently clicks on an online ad without any intention of learning more about the
                                   advertiser or making a purchase. Click fraud has become a serious problem at
                                   Google and other Web sites that feature pay-per-click online advertising.
                                     Some companies hire third parties (typically from low-wage countries) to
                                   fraudulently click on a competitor’s ads to weaken them by driving up their
                                   marketing costs. Click fraud can also be perpetrated with software programs
                                   doing the clicking, and botnets are often used for this purpose. Search engines
                                   such as Google attempt to monitor click fraud but have been reluctant to
                                     publicize their efforts to deal with the problem.

                                   Global Threats: Cyberterrorism and Cyberwarfare
                                   The cyber criminal activities we have described—launching malware, denial-of-
                                   service attacks, and phishing probes—are borderless. China, the United States,
                                   South Korea, Russia, and Taiwan are currently the sources of most of the world’s
                                   malware (King, 2012). The global nature of the Internet makes it possible for
                                   cybercriminals to operate—and to do harm—anywhere in the world.
                                     Internet vulnerabilities have also turned individuals and even entire nation
                                   states into easy targets for politically-motivated hacking to conduct  sabotage
                                   and espionage. Cyberwarfare is a state-sponsored activity designed to cripple
                                   and defeat another state or nation by penetrating its computers or networks for
                                   the purposes of causing damage and disruption.






   MIS_13_Ch_08 Global.indd   334                                                                             1/17/2013   3:10:20 PM
   330   331   332   333   334   335   336   337   338   339   340