Loading...

Messages

Proposals

Stuck in your homework and missing deadline? Get urgent help in $10/Page with 24 hours deadline

Get Urgent Writing Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework & Achieve A+ Grades.

Privacy Guaranteed - 100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

Marriott announces starwood guest reservation database security incident

18/11/2021 Client: muhammad11 Deadline: 2 Day

Marriott International Data Breach

Student’s Name

Professor’s Name

Institutional Affiliation

Course

1

1

Introduction

Data theft was discovered in 2018.

The data breach affected approximately 500 million customers.

Breach targeted systems supporting Starwood Hotel Brands.

Attackers remained in the system since 2016.

2016- Marriott acquired Starwood Hotel.

2

This slide gives an overview of the data breach and how it happened.

The data breach was discovered in 2018 although it had been there for four years.

The Marriott International acquired Starwood Hotel in 2016.

By then, the attackers were already in the system.

The data breach affected a total of 500 million people but the data went low following investigations.

2

USER (U) -

Problem

On 30th November, Marriott International announces compromised customer records.

Initial estimates indicated that 500 million customers affected.

The number decreased to 393 million over a period of investigations.

Hackers accessed the Starwood’s customer reservation system’s database.

3

This slide covers the problem as a whole. The data breach was announced in 2018 on 30th November the same year.

According to the original information, data belonging to 500 million customers belonging to the customers.

As the investigations proceeded, the number went down although the number was significant.

The system under question and whose database had been accessed was the Starwood’s Customer Reservation System.

3

Discovery

An internal security tool is credited for the discovery.

The discovery was made on 8th September 2018.

Unauthorized entity had been accessing the network over a long period.

The hacker encrypted data after copying it.

Encryption made it hard for authorities to detect and determine.

4

This slide covers how the breach of these systems was discovered.

Despite its existence having extended for four years, the major discovery was made on 8th September 2018.

Access to the system’s database had been made through the organization’s network.

Upon accessing the data, the attacker copied it creating a new version of it.

Due to the fact that the data was encrypted, it was hard to detect and determine its occurrence.

4

Attackers Responsible

Chinese Ministry of State Security was accused.

It sought to gather intelligence regarding the Hotel

This is in connection with other similar attacks.

Other hacked systems: Health insurance systems, and Security clearance files.

Tools, techniques, and procedures discovered during investigation.

5

There was a group of adversaries who were behind this attack.

Chinese intelligence agency has been at the center of the controversy over the matter.

The same agency has also been connected to other attacks.

Similar attacks that are associated with it include; attacks to health insurance systems and security clearance files.

Other than the discovery of the agency’s name, tools, techniques, and procedures of attack were discovered.

5

Affected Data

Some of the victims: Only name and contact information.

Other data: contact information, passport numbers, and guest information.

Starwood’s Data: Preferred Guest numbers, Travel database data.

Financial data: Credit card numbers and their expiration dates.

Data encrypted upon the breach.

6

Data affected during the attack included;

Data belonging to the individual customers; their contact information, passport numbers, and guest information.

Starwood’s data was also not safe as preferred guest numbers and travel database data were affected.

The attackers also accessed financial personal data such as credit card numbers and their expiration dates.

By the time the breach occurred, the data had already been encrypted.

Focus shifted to asking whether the attackers could access the data using a specialized key.

6

Aftermath

Five US States carrying out the investigations.

Company has ben fined close to £100 million.

Stricter compliance with the European Union’s General Data protection Regulation (GDPR).

Customers convinced to register on Web Watchers to monitor nefarious websites for data exchange.

Marriot made public their communication Email to prevent phishing attacks.

7

What followed after the attack?

Five states in the United States were incorporate in the investigation process.

The Marriott International Company was fined close to 100 million sterling pounds.

The regulations agencies tightened the noose on compliance with the existing regulation procedures.

Finally, Marriot came up with an email to notify customers of their official communication channel.

The Company also encouraged the customers to register for the Web Watchers, a site that could track where their personal information was being exchanged at a fee.

Homework is Completed By:

Writer Writer Name Amount Client Comments & Rating
Instant Homework Helper

ONLINE

Instant Homework Helper

$36

She helped me in last minute in a very reasonable price. She is a lifesaver, I got A+ grade in my homework, I will surely hire her again for my next assignments, Thumbs Up!

Order & Get This Solution Within 3 Hours in $25/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 3 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 6 Hours in $20/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 6 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 12 Hours in $15/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 12 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

6 writers have sent their proposals to do this homework:

Premium Solutions
Professor Smith
Top Writing Guru
Quick N Quality
Financial Assignments
Financial Solutions Provider
Writer Writer Name Offer Chat
Premium Solutions

ONLINE

Premium Solutions

I am a professional and experienced writer and I have written research reports, proposals, essays, thesis and dissertations on a variety of topics.

$38 Chat With Writer
Professor Smith

ONLINE

Professor Smith

I am an elite class writer with more than 6 years of experience as an academic writer. I will provide you the 100 percent original and plagiarism-free content.

$20 Chat With Writer
Top Writing Guru

ONLINE

Top Writing Guru

I have written research reports, assignments, thesis, research proposals, and dissertations for different level students and on different subjects.

$31 Chat With Writer
Quick N Quality

ONLINE

Quick N Quality

I am a PhD writer with 10 years of experience. I will be delivering high-quality, plagiarism-free work to you in the minimum amount of time. Waiting for your message.

$33 Chat With Writer
Financial Assignments

ONLINE

Financial Assignments

I reckon that I can perfectly carry this project for you! I am a research writer and have been writing academic papers, business reports, plans, literature review, reports and others for the past 1 decade.

$23 Chat With Writer
Financial Solutions Provider

ONLINE

Financial Solutions Provider

As per my knowledge I can assist you in writing a perfect Planning, Marketing Research, Business Pitches, Business Proposals, Business Feasibility Reports and Content within your given deadline and budget.

$20 Chat With Writer

Let our expert academic writers to help you in achieving a+ grades in your homework, assignment, quiz or exam.

Similar Homework Questions

Product design and process selection - Daphnia heart rate lab answers - Wall and floor tiling australian standards - Born a crime figurative language - Descriptive Essay - Research Specialty Care Paper. HIV/AIDS Specialty Care for Pregnant women paper - Four dimensions of competency - Servant leadership ethics and entrepreneurism - Barefoot investor novated lease - Ipip neo 300 personality test - Three historical examples of recessions affecting bargaining power - Introduction to advertising - Ldr circuit using op amp - Lefkowitz v great minneapolis surplus store case brief - Short pendulum vs long pendulum - Insulin - Mext scholarship 2016 results - M8d1 Learning Outcomes Why should I care? - Business principles and management 11e - Gfl quick training contract - 2x 4y 6 2 5 - Rewrite the set by listing its elements - Hbo go error code 03 37 317 - Email assignment - Poli 330 final exam quizlet - Case studies in finance bruner - Ifsm 301 - Recruitment and selection assignment sample - Chapter 18 section 2 reteaching activity the spanish american war - Arriva bus times milton keynes 8 - Wacc of tesla - How to calculate case mix index example - Can you mortgage a house in monopoly - The kohlberg dilemmas commonlit answers - Uk network of mindfulness teacher training organisations - Typed technical presentation - 3 pages with strong reference Page - Often found in doctors offices and pirate flags - Strike it rich x1 sweepstakes - Qld ambulance car seat fitting - Curriculum planning and programming - Chapter 11 summary frankenstein - Le reve perfume chemist warehouse - Gate control theory of pain example - Irobot case study - Signature Assignment: Medical Terminology Is a Big World - Fretsawyers and stamp collectors - When purchasing bulk orders of batteries a toy manufacturer - Pro forma statements in healthcare - Need Response 2 to below discussion-investors - How to test a capacitor with an oscilloscope - Revenue and expense recognition principle - Characteristics of procedural programming - 100 information literacy success 2nd edition - Nigeria human environment interaction - 3243 - V for vendetta sutler - Rectilinear motion sport examples - Sponges protostome or deuterostome - Analyze Your Customers - Central sunbelt federal credit union routing number hattiesburg ms - Matching fund types with fund categories - Narrative writing key vocabulary - Coworker taking credit for my work - Tim hortons case study analysis - Marriage customs in the middle ages - Genetics x linked genes answers - How to share data telstra - Data structure & algorithm - Patterns and algebra stage 1 activities - Puregym off peak hours greenwich - Example of a master status - Controversial issue – Nature vs Nurture - Johnson skin care products case study - Centerlink what is working credit - When the joneses wear jeans - Disc 4 T OF PN - Beldray digital plug in heater 17.85 amazon - Stephanie owen and isabel sawhill should everyone go to college - Food safety matters student guide - Profit volume ratio in break even analysis - Jane elliott change of habit - Rolston music company is considering the sale - Boq stamp duty calculator - Critical thinking using Critical lenses essay Due Monday - Math - William wallace primary sources - Is 160 ms reaction time good - Time of setting of hydraulic cement by vicat needle experiment - How to write a visual analysis art history - Coach bus to buffalo - Where is hamms brewed - Finding ksp from molar solubility - Positive factors of 28 - Duke west campus housing - Figurative language in literature examples - Surviving mars hawking institute and research lab - 10.1 skills practice riding a ferris wheel answers - Justice quotes in medea - John the ripper pro