Order For Similar Custom Papers & Assignment Help Services

Fill the order form details - writing instructions guides, and get your paper done.

Posted: September 15th, 2022

Access, Privacy, and Security Issues with WLAN

Access, Privacy, and Security Issues with WLAN
The data breach faced by Marriott Internationals is the most recent large scale data breach, which involved its Starwood division hotels. The international hotel acknowledged the reservation systems’ compromises, where customer information included passport numbers and credit cards. The breach was flagged by an internal security tool, which reported an unauthorized attempt to access the internal guest reservation database for the Starwood brands for Marriott International. It was reported after the forensic process that the reservation system had been comprised early in 2014 before the acquisition by the Hotel brand, Marriott International. The Starwood was acquired by Marriott, the reservation system used by the former Starwood hotels did not migrate toward the Marriot’s own reservation system and still utilized the infrastructure from the former Starwood hotel.
Before the company acquisition, Starwood IT and Infosecurity were run and monitored by Accenture noticed an unusual database query. The database query was made by a user with administrator privileges. However, on quick evaluation, it was noticed that the person assigned to the account did not make the query; hence someone else had gain control of the account. From the investigation conducted, it was found that data was encrypted and removed from the Starwood systems. More analysis also indicated that the attackers were able to decrypt the data, which included information on over 500 million guest records. Most of the records were described to have extremely sensitive information like credit card and passport numbers. From the investigation, Remote Access Trojan was used in conjunction with MimiKatz that sniffs out the username and the password combinations in system memory. The two tools are speculated to have given the attackers control of the administrator account.

The mistakes of Starwood and Marriott involve the failure of basic security where there was a lack of in-depth defense, which allowed attackers to stay in the system for years. Marriott was compromised due to its failure to follow an important cybersecurity rule that strengthens security by implementing the principle of assumes the company is compromised and acting accordingly. There are several deidentification methods that would have been applied by the company, which include differential privacy, pseudonymization, tokenization, and data masking.
The company should have ensured proper security assessment every year through a third-party vendor, which requires the company to meet compliance requirements. Proper tests would have uncovered and make an indication for the compromise. In the situation of a company acquisition, cybersecurity assessment should involve risk and vulnerability assessment, penetration test, and overall security controls assessment for the merging company. Another way would involve the frequent and monitoring of cloud access, which must identify those who log into the network and how much data they are moving and accessing. It is from cloud monitoring where suspicious log-in location and large data transfer are identified and stopped. It is key to encrypt data within the company, but it is more important where and how you store the encryption keys. It is important that the encryption keys be stored correctly. There should be efforts to strike a balance between cybersecurity and business operations. Cybersecurity must be made a priority for local and international businesses as breaches can adversely affect the daily operations. In conclusion, businesses and companies should focus on performing proper security assessments and, most importantly, the proper vetting of databases before the merging of the company acquired.

References
Marriott could have prevented privacy data breach with Tokenization. (2019, March 20). Security Boulevard. Retrieved from https://securityboulevard.com/2019/03/marriott-could-have-prevented-privacy-data-breach-with-tokenization/
Gaglione Jr, G. S. (2019). The Equifax Data Breach: An Opportunity to Improve Consumer Protection and Cybersecurity Efforts in America. Buff. L. Rev., 67, 1133.

Order | Check Discount

Tags: Access, and Security Issues with WLAN, Privacy

Assignment Help For You!

Special Offer! Get 20-25% Off On your Order!

Why choose us

You Want Quality and That’s What We Deliver

Top Skilled Writers

To ensure professionalism, we carefully curate our team by handpicking highly skilled writers and editors, each possessing specialized knowledge in distinct subject areas and a strong background in academic writing. This selection process guarantees that our writers are well-equipped to write on a variety of topics with expertise. Whether it's help writing an essay in nursing, medical, healthcare, management, psychology, and other related subjects, we have the right expert for you. Our diverse team 24/7 ensures that we can meet the specific needs of students across the various learning instututions.

Affordable Prices

The Essay Bishops 'write my paper' online service strives to provide the best writers at the most competitive rates—student-friendly cost, ensuring affordability without compromising on quality. We understand the financial constraints students face and aim to offer exceptional value. Our pricing is both fair and reasonable to college/university students in comparison to other paper writing services in the academic market. This commitment to affordability sets us apart and makes our services accessible to a wider range of students.

100% Plagiarism-Free

Minimal Similarity Index Score on our content. Rest assured, you'll never receive a product with any traces of plagiarism, AI, GenAI, or ChatGPT, as our team is dedicated to ensuring the highest standards of originality. We rigorously scan each final draft before it's sent to you, guaranteeing originality and maintaining our commitment to delivering plagiarism-free content. Your satisfaction and trust are our top priorities.

How it works

When you decide to place an order with Dissertation App, here is what happens:

Complete the Order Form

You will complete our order form, filling in all of the fields and giving us as much detail as possible.

Assignment of Writer

We analyze your order and match it with a writer who has the unique qualifications to complete it, and he begins from scratch.

Order in Production and Delivered

You and your writer communicate directly during the process, and, once you receive the final draft, you either approve it or ask for revisions.

Giving us Feedback (and other options)

We want to know how your experience went. You can read other clients’ testimonials too. And among many options, you can choose a favorite writer.