e of the event.Target Stores data breach in 2016 was one of the worst data breaches of all time. Thecredit breach involved the leak of thousands of customer credit card numbers and other personalinformation accessible to cyber criminals. Target in return had to provide thousands of dollars offunds for fraud protection to their customers or they would face twice the cost of lawsuits.Digital Crime is a just like any other crime but Digital crime involves technology infrastructure,including unauthorized or unlawful access a system by way of technology (Erl, Puttini, &Mahmood, 2016).The data breach happened and what need to do to stop the breachThe Target data breach was due to a basic network segmentation error that failed toproperly handle sensitive credit card information. This incident stemmed from a hackerreportedly using the credentials stolen from a third-party heating, ventilation, and airconditioning company Fazio Mechanical Services that works with Target (Mitchell, 2013).Malware programs were then uploaded to Targets (POS) systems testing the program abit at a time to monitor its success collecting millions of dollars of credit and debit cardinformation. This could have been prevented a numerous amount of ways. Controls could beimplemented to control to monitor the companies’ access to its network. Segmentation wouldTargets network would have prevented Fazio and other third parties who needed to get the taskdone to only be able to access certain content (Steinhauer, 2015).The organization doing to avoid the breach from happening in futureTo prevent future occurrences Target has implemented a numerous amount of controlsthat will trigger alarms that will alert them if any suspicious activity occurs or if any employeesor third-party companies is accessing things that they shouldn’t be. Target has also limited theamount of content that they store in their systems. Example, there was no reason whatsoever thatTarget should have been storing their customer debit card and pin information. In essence Targetand many other companies are putting them in a position to be compromised by storing this typeof proprietary data. Another method that Target has used to lower risk is to move away frommagnetic strips on credit/debit cards which can easily be faked, and now use chip based cards asa primary transaction method. Chip per-users at the purpose of selling encode all Visas, stick,and other individual information scrambling the data into a record that is secure. Utilizing thehazard, there aren’t full confirmation strategies to avoid hacking, however, there are significantlymore things that organizations can do to secure its purchaser’s information (“Opinion |Preventing the Next Data Breach,” 2014).Misrepresentation on the associationBecause of the information break Target needed to put more than 4 million dollars in freecredit checking programming for their clients. Outside of the companies aid Target also workedwith their IT professionals to invest in upgraded technology and bring in other IT professionalswith highly qualified accreditations to monitor network and data security (Steinhauer, 2015).Before Obama passed the Cyber Security Bill in 2015 companies did not have to disclose anyinformation related to hacking epidemics. Now companies are required to let communicate allhacking occupancies big or small. The credit breach involved the leak of thousands of customercredit card numbers and other personal information accessible to cyber criminals. Target inreturn had to provide thousands of dollars of funds for fraud protection to their customers or theywould face twice the cost of lawsuits (THE EDITORIAL BOARD, 2014).ConclusionIn most cases, I do not believe that all fraud and data breaches are informed to the publicif they are contained and do not impact the organization on a wide scale. It’s the equivalent of agroup of friends witnessing a murder, but no one letting the authorities know who the killer is.The secret would stay within the group until someone in the group felt that the risk was too greatand notified the authorities. Before Obama passed the Cyber Security Bill Companies were notrequired to disclose any information about fraud epidemics that took place within anorganization. This is why credit companies today offer added protections that monitor your creditcard activity as a front line to help prevent fraud. Controls could be implemented to control tomonitor the companies’ access to its network. Segmentation would Targets network would haveprevented Fazio and other third parties who needed to get the task done to only be able to accesscertain content.