Cybercrime Prevention
The fate of Target when it comes to cybercrime is fairly well known. They hit the headlines for all the wrong reasons when their customers' credit card information was exploited during a holiday season in recent years. Given that and given the ominous and ever-present threat of cybercrime, this brief report shall serve as a good guideline to help prevent cybercrime events and damages, or at least mitigate them. The lessons learned from Target's own breach are on full display in this report but there are other real-world lessons, events and principles that should also be considered and remembered.
Best Practices
Invest in Software & Hardware
• Do not go cheap or cut corners on hardware
• Do not go cheap or cut corners on software
• Make sure all software is fully functional and licensed
• Ensure uptime of all systems is as close to 100% as possible
• Use modern and state of the art hardware and software
• Avoid using wireless internet when at all possible
• NEVER use wireless internet to transmit credit card/sales information
• NEVER use WEP wireless encryption (has been hacked) -- only enterprise level WPA, WPA2 or something similar (Ou, 2007).
• Update software and hardware periodically so as to keep on the cutting edge.
• Do smaller incremental updates rather than huge...
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now