Security Breach May Have Exposed 40M Credit Cards
Security Breach May Have Exposed 40M Credit Cards
By: Tom Krazit
Date: June 17, 2005
Source: ComputerWorld. "Security Breach May Have Exposed 40M Credit Cards." June 17, 2005. 〈http://www.computerworld.com/securitytopics/security/story/0,10801,102631,00.html〉 (accessed January 14, 2006).
About the Author: The Information Data Group (IDG) is a leading global information technology organization. Besides hosting international IT events, the group publishes as many as 300 journals and magazines worldwide, including PC World, Computer World, GamePro, and Macworld. Tom Krazit, the group's U.S. correspondent for news and events in personal computing, peripherals, and handheld devices, has several articles to his credit on various information technology topics.
Every credit card is issued by an authorized financial institution and given a unique identifying number. Credit card data also contains personal details and other confidential information such as social security numbers. Credit card transactions use electronic methods of transmitting, storing, and retrieving account numbers, which are stored in electronically accessible databases. Data security is key to preventing identity theft and other financial frauds. Despite electronic safeguards and data security measures, such as secure online transmission between commercial nodes such as banks, credit card processors, and business establishments, the data is potentially vulnerable to abuse.
In mid-2005, network security at CardSystems Solutions Inc., a MasterCard processing company, was compromised by a hacker, exposing as many as 40 million credit card numbers to potential theft and abuse. Although MasterCard's fraud-detection system detected the breach in May 2005 and informed issuing banks about the incident, the sheer size of the breach—the largest to date—raised concerns worldwide.
"Security Breach May Have Exposed 40M Credit Cards" is a news report from the Computer World website.
[Text Not Available]
Electronic crime, especially unauthorized access to data in electronic information systems, has risen with the with the number of transactions conducted on the internet. American corporations lose around one billion dollars each year to credit card fraud. As a result, credit card security has become an increasing concern.
The credit card transaction system originally considered only the logistics of business transaction involving physical goods and services traded by real buyers and sellers. However, the advent of online shopping, auctions, and e-services such as online bill payment have made the system vulnerable to determined hackers.
To quell customer fears about the security and privacy of personal data, most financial institutions and credit card processing services adopt high-tech encryption and antihacking software to ensure highest level of security. As security systems become more advanced, however, hackers become more determined to crack them.
Despite the introduction of new technologies like Secure Socket Layer (SSL), a type of encryption that ensures maximum security, authentication, and address verification, credit card fraud continues to occur frequently. Various processing companies, merchant establishments, and financial institutions combat these threats with ever more sophisticated technology and advanced security measures. As of 2005, Visa and MasterCard announced various initiatives, safety measures, and multidimensional plans that look at risk perception from various angles to combat possible losses and credit card frauds.
CNNMoney.com. "Info on 3.9M Citigroup Customers Lost" 〈http://money.cnn.com/2005/06/06/news/fortune500/security_citigroup/〉 (accessed January 14, 2006).
Federal Bureau of Investigation. "Internet Fraud" 〈http://www.fbi.gov/majcases/fraud/internetschemes.htm〉 (accessed January 14, 2006).
Washington Post. "40 Million Credit Card Numbers Hacked" 〈http://www.washingtonpost.com/wp-dyn/content/article/2005/06/17/AR2005061701031.html〉 (accessed January 14, 2006).
"Security Breach May Have Exposed 40M Credit Cards." Crime and Punishment: Essential Primary Sources. . Encyclopedia.com. 25 Apr. 2019 <https://www.encyclopedia.com>.
"Security Breach May Have Exposed 40M Credit Cards." Crime and Punishment: Essential Primary Sources. . Encyclopedia.com. (April 25, 2019). https://www.encyclopedia.com/law/educational-magazines/security-breach-may-have-exposed-40m-credit-cards
"Security Breach May Have Exposed 40M Credit Cards." Crime and Punishment: Essential Primary Sources. . Retrieved April 25, 2019 from Encyclopedia.com: https://www.encyclopedia.com/law/educational-magazines/security-breach-may-have-exposed-40m-credit-cards
Encyclopedia.com gives you the ability to cite reference entries and articles according to common styles from the Modern Language Association (MLA), The Chicago Manual of Style, and the American Psychological Association (APA).
Within the “Cite this article” tool, pick a style to see how all available information looks when formatted according to that style. Then, copy and paste the text into your bibliography or works cited list.
Because each style has its own formatting nuances that evolve over time and not all information is available for every reference entry or article, Encyclopedia.com cannot guarantee each citation it generates. Therefore, it’s best to use Encyclopedia.com citations as a starting point before checking the style against your school or publication’s requirements and the most-recent information available at these sites:
Modern Language Association
The Chicago Manual of Style
American Psychological Association
- Most online reference entries and articles do not have page numbers. Therefore, that information is unavailable for most Encyclopedia.com content. However, the date of retrieval is often important. Refer to each style’s convention regarding the best way to format page numbers and retrieval dates.
- In addition to the MLA, Chicago, and APA styles, your school, university, publication, or institution may have its own requirements for citations. Therefore, be sure to refer to those guidelines when editing your bibliography or works cited list.