Security in Networking
Data breaches have become common in today’s business environment as organizations are increasingly vulnerable to a data breach or cyber-attack. Jain & Ropple (2018) state that many companies or institutions face huge challenges in successful management of cyber risk despite increased expenditures on their network security. Even though some industry standards have been established, they are relatively vague. Additionally, existing solutions for safeguarding companies or institutions against data breaches are not entirely effective. Sophisticated criminal problems have compounded or worsened organizations’ vulnerabilities to data breaches or cyber-attacks. This paper examines the recent data breach at Marriot International, a large American hotel chain. The evaluation discusses the existing telecommunication and network practices at the time, what contributed to the breach, and a plan of action to alleviate these factors.
Marriot’s Data Breach and Existing Network Practices
Marriot International suffered what is regarded as the biggest corporate data breaches in history. The data breach resulted in the loss of data on 500 million guests including credit card and passport information (Brewster, 2018). The company admitted that the data breach occurred on its Starwood guest reservation database. In addition to credit card and passport information, the hackers also obtained data on mailing and email addresses, phone number, payment card numbers and their expiration dates. The stolen data relates to reservations made at Starwood guest database between 2014 and September 2018. This essentially means that hackers had unauthorized access to the hotels’ network for a period of four years. In its initial report, the company states that the exact data taken by the hackers remains unknown and subject to the findings of ongoing investigations into the data breach. The company seeks to establish what was exactly stolen by these hackers through its dedicated framework for helping affected guests. In this regard, Marriot established a series of steps to assist guests affected by the data breach including establishing a dedicated website and call center. The company is also sending email notifications to affected guests and providing them one-year free subscription to Webwatcher data security software.
One of the existing telecommunication...
References
Atkinson, D. (2019). How AI Can Prevent a Marriott Situation from Happening Again. Retrieved February 9, 2019, from https://www.techradar.com/news/how-ai-can-prevent-a-marriott-situation-from-happening-again
Beal, V. (2005, July 15). Intrusion Detection (IDS) and Prevention (IPS) Systems. Retrieved February 9, 2019, from https://www.webopedia.com/DidYouKnow/Computer_Science/intrusion_detection_prevention.asp
Brewster, T. (2018, November 30). Marriott Hackers Stole Data on 500 Million Guests - - Passports and Credit Card Info Included. Forbes. Retrieved February 9, 2019, from https://www.forbes.com/sites/thomasbrewster/2018/11/30/marriott-admits-hackers-stole-data-on-500-million-guests/#5e9124b46492
Jain, S.C. & Ropple, L.M. (2018, December 14). Stopping Data Breaches will Require Help from Governments. Harvard Business Review. Retrieved February 9, 2019, from https://hbr.org/2018/12/stopping-data-breaches-will-require-help-from-governments
Sivalingam, J. (2018, December 4). What Caused the Marriott Data Breach? Retrieved February 9, 2019, from https://techwireasia.com/2018/12/what-caused-the-marriott-data-breach/
Stevenson, C., Douglas, A., Nicholson, M. & Amjad, A. (2019). From Security Monitoring to Cyber Risk Monitoring: Enabling Business-aligned Cybersecurity. Retrieved February 9, 2019, from https://www2.deloitte.com/insights/us/en/deloitte-review/issue-19/future-of-cybersecurity-operations-management.html
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now