Loading...

Messages

Proposals

Stuck in your homework and missing deadline? Get urgent help in $10/Page with 24 hours deadline

Get Urgent Writing Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework & Achieve A+ Grades.

Privacy Guaranteed - 100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

Marriott announces starwood guest reservation database security incident

18/11/2021 Client: muhammad11 Deadline: 2 Day

Marriott International Data Breach

Student’s Name

Professor’s Name

Institutional Affiliation

Course

1

1

Introduction

Data theft was discovered in 2018.

The data breach affected approximately 500 million customers.

Breach targeted systems supporting Starwood Hotel Brands.

Attackers remained in the system since 2016.

2016- Marriott acquired Starwood Hotel.

2

This slide gives an overview of the data breach and how it happened.

The data breach was discovered in 2018 although it had been there for four years.

The Marriott International acquired Starwood Hotel in 2016.

By then, the attackers were already in the system.

The data breach affected a total of 500 million people but the data went low following investigations.

2

USER (U) -

Problem

On 30th November, Marriott International announces compromised customer records.

Initial estimates indicated that 500 million customers affected.

The number decreased to 393 million over a period of investigations.

Hackers accessed the Starwood’s customer reservation system’s database.

3

This slide covers the problem as a whole. The data breach was announced in 2018 on 30th November the same year.

According to the original information, data belonging to 500 million customers belonging to the customers.

As the investigations proceeded, the number went down although the number was significant.

The system under question and whose database had been accessed was the Starwood’s Customer Reservation System.

3

Discovery

An internal security tool is credited for the discovery.

The discovery was made on 8th September 2018.

Unauthorized entity had been accessing the network over a long period.

The hacker encrypted data after copying it.

Encryption made it hard for authorities to detect and determine.

4

This slide covers how the breach of these systems was discovered.

Despite its existence having extended for four years, the major discovery was made on 8th September 2018.

Access to the system’s database had been made through the organization’s network.

Upon accessing the data, the attacker copied it creating a new version of it.

Due to the fact that the data was encrypted, it was hard to detect and determine its occurrence.

4

Attackers Responsible

Chinese Ministry of State Security was accused.

It sought to gather intelligence regarding the Hotel

This is in connection with other similar attacks.

Other hacked systems: Health insurance systems, and Security clearance files.

Tools, techniques, and procedures discovered during investigation.

5

There was a group of adversaries who were behind this attack.

Chinese intelligence agency has been at the center of the controversy over the matter.

The same agency has also been connected to other attacks.

Similar attacks that are associated with it include; attacks to health insurance systems and security clearance files.

Other than the discovery of the agency’s name, tools, techniques, and procedures of attack were discovered.

5

Affected Data

Some of the victims: Only name and contact information.

Other data: contact information, passport numbers, and guest information.

Starwood’s Data: Preferred Guest numbers, Travel database data.

Financial data: Credit card numbers and their expiration dates.

Data encrypted upon the breach.

6

Data affected during the attack included;

Data belonging to the individual customers; their contact information, passport numbers, and guest information.

Starwood’s data was also not safe as preferred guest numbers and travel database data were affected.

The attackers also accessed financial personal data such as credit card numbers and their expiration dates.

By the time the breach occurred, the data had already been encrypted.

Focus shifted to asking whether the attackers could access the data using a specialized key.

6

Aftermath

Five US States carrying out the investigations.

Company has ben fined close to £100 million.

Stricter compliance with the European Union’s General Data protection Regulation (GDPR).

Customers convinced to register on Web Watchers to monitor nefarious websites for data exchange.

Marriot made public their communication Email to prevent phishing attacks.

7

What followed after the attack?

Five states in the United States were incorporate in the investigation process.

The Marriott International Company was fined close to 100 million sterling pounds.

The regulations agencies tightened the noose on compliance with the existing regulation procedures.

Finally, Marriot came up with an email to notify customers of their official communication channel.

The Company also encouraged the customers to register for the Web Watchers, a site that could track where their personal information was being exchanged at a fee.

Homework is Completed By:

Writer Writer Name Amount Client Comments & Rating
Instant Homework Helper

ONLINE

Instant Homework Helper

$36

She helped me in last minute in a very reasonable price. She is a lifesaver, I got A+ grade in my homework, I will surely hire her again for my next assignments, Thumbs Up!

Order & Get This Solution Within 3 Hours in $25/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 3 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 6 Hours in $20/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 6 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 12 Hours in $15/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 12 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

6 writers have sent their proposals to do this homework:

Premium Solutions
Professor Smith
Top Writing Guru
Quick N Quality
Financial Assignments
Financial Solutions Provider
Writer Writer Name Offer Chat
Premium Solutions

ONLINE

Premium Solutions

I am a professional and experienced writer and I have written research reports, proposals, essays, thesis and dissertations on a variety of topics.

$38 Chat With Writer
Professor Smith

ONLINE

Professor Smith

I am an elite class writer with more than 6 years of experience as an academic writer. I will provide you the 100 percent original and plagiarism-free content.

$20 Chat With Writer
Top Writing Guru

ONLINE

Top Writing Guru

I have written research reports, assignments, thesis, research proposals, and dissertations for different level students and on different subjects.

$31 Chat With Writer
Quick N Quality

ONLINE

Quick N Quality

I am a PhD writer with 10 years of experience. I will be delivering high-quality, plagiarism-free work to you in the minimum amount of time. Waiting for your message.

$33 Chat With Writer
Financial Assignments

ONLINE

Financial Assignments

I reckon that I can perfectly carry this project for you! I am a research writer and have been writing academic papers, business reports, plans, literature review, reports and others for the past 1 decade.

$23 Chat With Writer
Financial Solutions Provider

ONLINE

Financial Solutions Provider

As per my knowledge I can assist you in writing a perfect Planning, Marketing Research, Business Pitches, Business Proposals, Business Feasibility Reports and Content within your given deadline and budget.

$20 Chat With Writer

Let our expert academic writers to help you in achieving a+ grades in your homework, assignment, quiz or exam.

Similar Homework Questions

JC Penny as a Case Study - During the year a company recorded prepayments of expenses - Angewandte chemie endnote style - How to get system date in c++ - Ethical Dilemmas - ICA Summary 1b - P7#1 - Using microsoft access 2016 independent project 1 5 - Alaska fly fishing expedition case study - Marriott income statement - Senco electronics company case study - Olap vs oltp in data warehouse - Essay on an printing in a arts museum - Similar triangles examples with answers - I ll rise ben harper maya angelou - Ielts verification candidate identity - Legal aspects of engineering 9th edition pdf - Scout shop leicester forest east - Reading response - Unit 6 test a spanish - Chapter 8 return on invested capital and profitability analysis solutions - Kodak and the digital revolution case study analysis - Bristol and bath science park - G2 - Separating real and imaginary parts in matlab - Video worksheet sicko answers - Business services training package assessment guidelines - Topic 10 DQ 1 - Barton private hospital admission form - Desert ecosystem food chain diagram - Why might musicians use their music to raise awareness and consciousness about different social issues? - Us health care settings powerpoint presentation - Lorna bailey grotesque birds - National diploma in counselling level 6 nz - Adairs gift card balance - Families of elements worksheet answer key - Cardiac Physiology: Electrical Activity - Global pol study design - International society for photogrammetry - Paradise corporation budgets on an annual basis - Ieee 802 lan man standards committee - Isobutane condensed structural formula - D-5 - For the chemical reaction h2 co2 - Glencoe accounting workbook answers chapter 10 - Judith wright hsc poems - Is paying accounts payable an operating activity - What questions do social scientists ask - 37.62 rounded to the nearest hundredth - 509-F - Information System and Technology - Pathophysiology - Modern arabian oud perfume - Hpq hpe spinoff cost basis - Lolwa meaning - A-B-C Analysis of Target Behaviors due in 24hours - Empirical Research and Developmental Theory - Online scavenger hunt for success gcu bio 220 - Sly dealings skill in deceiving - Culture neutral assessment in psychology - Interview an Licensed Professional Counselor - Kenwood th f6a vs yaesu vx 6r - Under armour target market age - V belt design guide - Ted ed natural selection - Hubspot marketing plan generator - Chase bank 26th street santa monica - Does Marketing Create or Satisfy Needs? - My sparc rewards coca cola - John deere 1837 invention - Investigation Considerations - The ride of a lifetime book depository - Starbucks Team assignment: Forecast - Rights and responsibilities lens - Mountain dew vote flavor 2014 - C++ neural network library - Aquafresh whitening trays - French cocked hat highwayman - Data profiling and cleansing - Strayer writing standards sws format - Periodic table practice problems - Importance of ihi certificate wgu - Paper 4 Marketing strategy and consumer behavior - Colchester and district sunday league - Elive led pod track lighting - Programming - Cover page for a report - X ray interaction with matter - Economics a level syllabus - PSYCHOLOGY - Field Experience Paper (CRJ 110) - Miss gates in to kill a mockingbird - Titan surge brake actuator - What did noblemen wear in ancient egypt - Human trafficking ethical theories - Excel sheet - Bill kellner read dentist - Intended for brilliant answers - Ibm v7r1 end of support announcement - People like us david brooks