You are on page 1of 1

Name: Verlyne O.

Gorospe
Title: Case Study: I.T Security Problems on Retails
Objectives:
a) To find different IT problems faced by retail industries.
b) To understand consumers current awareness of data breaches, and discover which
breaches are most top of mind.
c) Explore consumer thoughts and opinions on data breaches and prevention
techniques such as encryption technology.
Related Literature on Problems:
1. With such a huge focus on implementing the most advantageous IT solution or
determining which of the latest and greatest web applications, servers and databases
best suits the objectives of an organization, protecting the information held by those
assets has often been handled as second priority. Many enterprises may be fooled
into thinking that because they have not been hit, there is no threat. Standards
bodies have a unique ability and responsibility to address security vulnerabilities in
protocols. There are immediate and relatively simple actions standards bodies can
take to improve the security of all protocols currently being standardized. (Security in
Telecommunications and Information Technology, 2003)
2. Credit Card Fraud is one of the biggest threats to business establishments today.
However, to combat the fraud effectively, it is important to first understand the
mechanisms of executing a fraud. Credit card fraudsters employ a large number of
modus operandi to commit fraud. (Tej Paul Bhatla, 2003)
3. Since retail systems can be widely dispersed and within reach of the public,
protecting them against cyber-attacks is ever more difficult. Retail systems are
connected to a diverse set of networks in-store, corporate and public internet
often reaching around the globe. (McFee 2012)
4. In the retail business, certain security issues can impact customer confidence and the
bottom lineregulatory penalties, breaches, and unscheduled downtime? Retailers
know they need to address these issues, but the security solutions they deploy
cannot come with increased labor costs and require system or network upgrades.
(McFee 2010)
5. All retailers deal with security attacks in some way, shape or form. These threats fall
into two main categories: financial threats and advanced persistent threats (APTS). In
financial threats, cybercriminals seek monetary gain through the theft of card data,
PINs and more. One example of a financial threat is the ZeuS Trojan, which can be
spread via malicious links in email or links on social media sites. It has already
infected an estimated 4 million computers worldwide. (Peggy Bresnick Kendler, 2011)
6. Cyber security strives to ensure the attainment and maintenance of the security
properties of the organization and users assets against relevant security risks in the
cyber environment. (Jurrien Wagenaar, 2014)

You might also like