The Bullseye Anatomy of an Electronic Break

The Bullseye Breach-Anatomy of an Electronic Break-In is an IT security educational story that corresponds to recent international ripped on cybercrime operations through semi-fictionalized retailing enterprises (Stamos, 2015). Greg Scott's debut is as an IT specialist and expert who wants to solve the enigma of data breaches in today's world. The book describes how a multimillion-dollar Minneapolis retailer lost about 40 million credit card numbers to a cast of international crooks (Groshoff, 2016). Bullseye Breach focuses on IT professionals, bringing up issues like as IT security in the real world. Greg Scott's provides excellent advise to internet businesses and organizations on how to deter thieves (Lazear et al., 2013). The story by Greg is astonishing; the events have come from real life situation, but through creativity, he has explained the circumstances in a fictional manner to make the story attractive to the target audience.

Bullseye Breach is a pleasurable fictional tale with all ingredients of international crime story including a floating lifeless body in the Gulf of Finland, how crooks search the internet to find their target and their initial penetration to Bullseye Stores’ network system (Lazear et al., 2013). As well as how criminal recon the network looking for pay and how they're installing a bad software which steals credit card numbers on a spectacular range. In the same chapter, Greg Scott introduced the main characters with their roles (Stamos, 2015). The story is even more interesting as the author brought in a few innocent victims and downstream criminals to light. The story of a Fools’ Gold Academy is one of the cybercrime occurrence and how a few people in Minneapolis who were not bound by oppressive corporate bureaucracy try to come up with inventive techniques to fight back. The Russian Throng, a loosely coordinated international cast of crooks, naive IT Department experts, and professionals, a brand of new American society in Texas and a few friendly people who figured out on how to deal with the menace as being portrayed in the story (Groshoff, 2016).

In the novel Bullseye Breach, Greg Scott’s explains a fictional account of what happened to a major retail store, Bullseye, and Uncle Sam Bank. Greg Scott describes how the retailer ends up losing more than 40 million credit cards numbers from different cardholders to Russian cyber-crime thieves. The card numbers were taken by a group of international criminals who operated in isolation. In the story, Greg Scott uses a fictional Minneapolis retail shop named the Bullseye Stores’ (Carroll, 2017). He depicts a confrontation between different characters such as Special Agent Connor Duncan, Secretary Evelyn, Ms. Chatsworth, Liz Isaacs and business executives to indicate the attitude of various workers who think that security is a burden. In a nutshell, Duncan called to speak with Daniel Berger through a phone call from Minneapolis FBI (Groshoff, 2016). Unfortunately, Special Agent Duncan found Mr. Berger unavailable and opted to speak to Evelyn. At that moment Special Agent Duncan asked Evelyn if she was aware of unknown people using Bullseye store credit cards to steal on a colossal scale. Connor even demanded to talk to the Bullseye Stores’ CEO, who was not willing to connect him with his bosses. From the summary above, it appears most top offices at Bullseye Stores’ were not concerned with the security of their clients, yet the customers are the heart of the business (Carroll, 2017).

The poor organizational management, unskilled and scruffy workers, for instance, Liz Isaacs the CIO officer who had an executive council meeting a few minutes before Special Agent Duncan's phone call. The story's characters including Ms. Chatsworth heard a message from the boss at Quantico to Federal Judge Marvin Thornton in Minneapolis. The letter portrayed how his boss's credit card number became invalid after Russian mob robbed the card (Lazear et al., 2013). The incident of Ms. Chatsworth reporting his boss's incident to Federal Judge at Minneapolis show how innocent victims try various ways to fight back their rights which were ignored by Bullseye Stores’. However, Greg provides enough details of what went wrong with the security system of the company but not in such a comprehensive manner to satisfy the reader. The activities mentioned above are about fictional individuals and organizations, but the events are applicable in real-life situations. Scott’s also brings in measures that can be taken to prevent such cases which can wreck corporations and individual reputations (Groshoff, 2016).

The relationship between the stories in the Bullseye Breach and their relevance to real-life events is tangible. The novel stories are essential to human life in a significant way; some victims can learn what to do and what not to do in case of such misfortunes. In the book, 40 million credit card holders losing their card numbers is not a mere occurrence as mention by Youngdale (2006). The cases can be related to Mr. Tom event when he was blackmailed at Ashley Madison. He started using Ashley Madison many years ago before cyber thieves criminals hacked and exposed his personal information in 2015 (Lazear et al., 2013). After the event, the cybercriminals contacted him demanding not less than 500$ to delete his identity from the public domain. The criminals also informed Mr. Tom that if he failed to pay, they would send information to his family about his affairs at AM. From Tom’s situation, it is wise to learn how to keep personal passwords safe and to pay attention to websites they are browsing. It is also critical for individuals’ not to share their PIN or even saving their PIN on other people's desktop, phones, tablets or wreck websites. Individuals should also avoid clicking on emails attachments, and any screen savers sent to them from unknown people (Youngdale, 2006). These measures will protect online users from cybercrimes. Not to mention, there is a recent invention of malicious ransomware called WannaCry which spreads around the world walloping millions of innocent victims including the large corporations and public utilities. The ransomware crippled National Health Services Hospital in the United Kingdom leading to delay of vital medical services and creation of chaos for several British patients. According to Greg Scott’s such cases can be stopped only when experienced IT experts are deployed, but not IT professionals who have no experience like those in the original story the Bullseye Breach (Lazear et al., 2013).

The main topic in the novel Bullseye Breach by Greg Scott’s is the insecurity and online security issues faced by network users including companies and organizations (Carroll, 2017). The primary objective of OS concepts module is to equip learners’ with essential ideas of the modern operating system functions including processes, concurrent processes, inter-process communication, synchronization, deadlocks and process scheduling, memory management, paging, swapping, segmentation and virtual memory (Youngdale, 2006). Also, the file systems and it is implementation besides the input-output systems and mass storage structure. One of the sophisticated knowledge of OS concepts is the operating system security (OS security) which is a modern way of ensuring that Operating System confidentiality, availability and integrity are safeguarded (Stamos, 2015). The OS concepts can be used to protect OS from threats, malware such as ransomware, worms, viruses and isolated hackers intrusion (Lazear et al., 2013). By applying fundamental knowledge of operating system concepts learned, the OS security domain can be strengthened by encompassing all preventive or control measures and techniques to safeguard all computer property which are at risk of being edited illegally, stolen or even being deleted from the OS. The Operating System security structure entails numerous methods and procedures to ensure privacy and safety of POS and PII systems from threats and attacks (Carroll, 2017). The Operating System will allow different and only verified applications and programs to perform a separately authorized task and to stop unauthorized duty.


Carroll, R. (2017). In Dickens Bleak house and its 2005 BBC adaptation. Dickens Adapted.

Groshoff, D. (2016). Moore's Law versus Man's Law: How Cyber security and Cyber Terror Government Policies May Help or Hurt Entrepreneurial Startups. Chap. L. Rev., 19, 373.

Lazear, G., Karlstrom, K., Aslan, A., & Kelley, S. (2013). Denudation and flexural isostatic response of the Colorado Plateau and southern rocky Mountains region since 10 Ma. Geosphere, 9(4), 792-814.

Stamos, A. C. (2015). U.S. Patent No. 9,106,661. Washington, DC: U.S. Patent and Trademark Office.

Youngdale, E. M. (2006). Reviewing the law Reviews. Defense Counsel Journal, 73(4), 392.

Deadline is approaching?

Wait no more. Let us write you an essay from scratch

Receive Paper In 3 Hours
Calculate the Price
275 words
First order 15%
Total Price:
$38.07 $38.07
Calculating ellipsis
Hire an expert
This discount is valid only for orders of new customer and with the total more than 25$
This sample could have been used by your fellow student... Get your own unique essay on any topic and submit it by the deadline.

Find Out the Cost of Your Paper

Get Price