Question

Assume a scenario where the hackers gained access to information through malware on Point-of-Sale (POS) systems...

Assume a scenario where the hackers gained access to information through malware on Point-of-Sale (POS) systems of more than million credit and debit card. The firewall had captured the first malware code and an alert was issued which was ignored. The hackers started downloading the collected data. The cyber criminals have hacked the system to gain credit and debit card information.

1. Explain in your own words what happened in the above discussed data breach. [5 Marks]

2. Identify and experience the type of attack experienced in the above scenario [2 Marks]

3. The stolen credentials alone are not enough to access the company’s POS devices. What other means can the hackers acquire to allow them to navigate the company’s network and deploy the malware. [3 Marks]

4. What would have hackers done for privilege escalation? [2 Marks]

5. The organization admitted that they ignored many alerts from their network security devices because of alert overload. If you are the organization’s Chief Technical Officer (CTO), what would you do to reduce the problem of alert overload? [3 Marks]

6. The security experts criticize the organization for failing to isolate sensitive sections of their networks from those more easily accessible to outsiders. As a CTO, please propose a feasible solution to segment and categorize your networks and resources. [5 Marks]

Homework Answers

Answer #1

Question 1 :

Point of Sale :

Point of sale (POS), a critical piece of a point of purchase refers to the place where a customer executes the payment for goods or services and where sales taxes may become payable. It can be in a physical store, where POS terminals and systems are used to process card payments or a virtual sales point such as a computer or mobile electronic device.

Points of sale (POSs) are an important focus for marketers because consumers tend to make purchasing decisions on high-margin products or services at these strategic locations. Traditionally, businesses set up POSs near store exits to increase the rate of impulse purchases as customers leave. However, varying POS locations can give retailers more opportunities to micro-market specific product categories and influence consumers at earlier points in the sales funnel.

Benefits of POS Systems

Electronic POS software systems streamline retail operations by automating the transaction process and tracking important sales data. Basic systems include an electronic cash register and software to coordinate data collected from daily purchases. Retailers can increase functionality by installing a network of data-capture devices, including card readers and barcode scanners.

Depending on the software features, retailers can track pricing accuracy, inventory changes, gross revenue, and sales patterns. Using integrated technology to track data helps retailers catch discrepancies in pricing or cash flow that could lead to profit loss or interrupt sales. POS systems that monitor inventory and buying trends can help retailers avoid customer service issues, such as out-of-stock sales, and tailor purchasing and marketing to consumer behavior.

POS Innovation

Modern POS systems are commonly programmable or allow enhancement with third-party software programs. These systems can be tailored to meet specific needs. For example, many retailers use POS systems to manage membership programs that award points to frequent buyers and issue discounts on future purchases.

Cloud based POS systems are increasingly in use, particularly for large online merchants, to track and process numerous purchases. Cloud-based systems can greatly reduce the upfront costs of implementing a POS system for many businesses.

Customers can also interact directly with POS systems, particularly in the hospitality industry. Often referred to as location-based technology, these systems can process transactions at customer locations. For example, at many restaurants, customers can view menus and place orders on terminals located at their table. In hotels, customers use similar terminals to place orders for room service or to pay hotel bills.

To stay competitive and aid brand owners in promoting their products, POS display manufacturers are focused on improving aesthetics and creating innovative product designs. Also, the intensifying competition in the retail industry and resulting use of POS displays for enticing customers to purchase products have encouraged retailers to demand different custom-made displays capable of serving specific needs across different retail facilities. Customization offered in terms of aesthetics, capacity, and mobility can greatly impact a company's brand identification.

Terminology

Retailers and marketers will often refer to the area around the checkout instead as the point of purchase (POP) when they are discussing it from the retailer's perspective. This is particularly the case when planning and designing the area as well as when considering a marketing strategy and offers.

Some point of sale vendors refer to their POS system as "retail management system" which is actually a more appropriate term given that this software is no longer just about processing sales but comes with many other capabilities such as inventory management, membership system, supplier record, bookkeeping, issuing of purchase orders, quotations and stock transfers, hide barcode label creation, sale reporting and in some cases remote outlets networking or linkage, to name some major ones.

Nevertheless, it is the term POS system rather than retail management system that is in vogue among both end-users and vendors.

The basic, fundamental definition of a POS System, is a system which allows the processing and recording of transactions between a company and their consumers, at the time in which goods and/or services are purchased.

Know the answer?
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for?
Ask your own homework help question
Similar Questions
Assume a scenario where the hackers gained access to information through malware on Point-of-Sale (POS) systems...
Assume a scenario where the hackers gained access to information through malware on Point-of-Sale (POS) systems of more than million credit and debit card. The firewall had captured the first malware code and an alert was issued which was ignored. The hackers started downloading the collected data. The cyber criminals have hacked the system to gain credit and debit card information. 1. Explain in your own words what happened in the above discussed data breach. [5 Marks] 2. Identify and...
Assume a scenario where the hackers gained access to information through malware on Point-of-Sale (POS) systems...
Assume a scenario where the hackers gained access to information through malware on Point-of-Sale (POS) systems of more than million credit and debit card. The firewall had captured the first malware code and an alert was issued which was ignored. The hackers started downloading the collected data. The cyber criminals have hacked the system to gain credit and debit card information. 1. Explain in your own words what happened in the above discussed data breach. [5 Marks] 2. Identify and...
Assume a scenario where the hackers gained access to information through malware on Point-of-Sale (POS) systems...
Assume a scenario where the hackers gained access to information through malware on Point-of-Sale (POS) systems of more than million credit and debit card. The firewall had captured the first malware code and an alert was issued which was ignored. The hackers started downloading the collected data. The cyber criminals have hacked the system to gain credit and debit card information. 1. Explain in your own words what happened in the above discussed data breach. [5 Marks] 2. Identify and...
Assume a scenario where the hackers gained access to information through malware on Point-of-Sale (POS) systems...
Assume a scenario where the hackers gained access to information through malware on Point-of-Sale (POS) systems of more than million credit and debit card. The firewall had captured the first malware code and an alert was issued which was ignored. The hackers started downloading the collected data. The cyber criminals have hacked the system to gain credit and debit card information. 1. Explain in your own words what happened in the above discussed data breach. [5 Marks] 2. Identify and...
Assume a scenario where the hackers gained access to information through malware on Point-of-Sale (POS) systems...
Assume a scenario where the hackers gained access to information through malware on Point-of-Sale (POS) systems of more than million credit and debit card. The firewall had captured the first malware code and an alert was issued which was ignored. The hackers started downloading the collected data. The cyber criminals have hacked the system to gain credit and debit card information. 1. Explain in your own words what happened in the above discussed data breach. [5 Marks] 2. Identify and...
Assume a scenario where the hackers gained access to information through malware on Point-of-Sale (POS) systems...
Assume a scenario where the hackers gained access to information through malware on Point-of-Sale (POS) systems of more than million credit and debit card. The firewall had captured the first malware code and an alert was issued which was ignored. The hackers started downloading the collected data. The cyber criminals have hacked the system to gain credit and debit card information. 1. Explain in your own words what happened in the above discussed data breach. [5 Marks] 2. Identify and...
Assume a scenario where the hackers gained access to information through malware on Point-of-Sale (POS) systems...
Assume a scenario where the hackers gained access to information through malware on Point-of-Sale (POS) systems of more than million credit and debit card. The firewall had captured the first malware code and an alert was issued which was ignored. The hackers started downloading the collected data. The cyber criminals have hacked the system to gain credit and debit card information. 1. Explain in your own words what happened in the above discussed data breach. [5 Marks] 2. Identify and...
Answer in an hour please. Thanks Assume a scenario where the hackers gained access to information...
Answer in an hour please. Thanks Assume a scenario where the hackers gained access to information through malware on Point-of-Sale (POS) systems of more than million credit and debit card. The firewall had captured the first malware code and an alert was issued which was ignored. The hackers started downloading the collected data. The cyber criminals have hacked the system to gain credit and debit card information. 1. Explain in your own words what happened in the above discussed data...