Analyze the approach taken by the attackers to gain access

Assignment Help Computer Network Security
Reference no: EM131467395 , Length: 3

During the Christmas holiday shopping season in 2013, Target Corporation revealed that it had been the victim of a massive data breach, which compromised the identities of millions of their customers.

While Target had the misfortune of being the first to reveal the breach, it was later discovered, in a much less public way, that other retailers had been victims of the same attack.

Engage in research on this particular data breach and learn as much as you can about the circumstances, sources, and methods that were used in this attack. When you have completed that research and the study activities related to security principles, apply those principles to what you have learned about the attack.

Write a 2-3 page paper discussing the areas of vulnerability that were exploited and what security principles failed, providing a gateway into the information assets of Target Corporation and other retailers. As part of your discussion:

Analyze the approach taken by the attackers to gain access to this data.

Analyze the failures in the security principles that made the organization vulnerable to this attack.

Explain how this attack could have been prevented without impacting user productivity or customer satisfaction.

Explain how the security principles can be applied in order to enforce policy and prevent a future breach.

Assignment Requirements

Written communication: Written communication is free of errors that detract from the overall message.

APA formatting: Resources and citations are formatted according to APA (6th edition) style and formatting.

Length of paper: 2-3 pages, excluding the references page.

Font and font size: Times New Roman, 12 point.

Reference no: EM131467395

Questions Cloud

Find the time required to obtain a bond between the plates : Two square plates are to be glued together by means of a radiant heat source, q", acting on one plate (Fig.). The glue becomes effective at a temperature Tm.
Critically analyse a famous speech : MPM732: Critical thinking Assignment. Critically analyse a famous speech and and structurally compare it with a statement by the head of a company
Execute a visual basic net application : For this first Critical Thinking assignment you will be locate and execute a Visual Basic .NET application. You will need to download the data files.
Decide whether to make a component part in-house : Your business must decide whether to make a component part in-house or outsource it to an independent supplier.
Analyze the approach taken by the attackers to gain access : Analyze the failures in the security principles that made the organization vulnerable to this attack.
Find steady axial temperature distribution of liquid metal : A liquid metal flowing with a uniform velocity V through a pipe of periphery P and cross section A is electrically heated at the rate of u"' over a length.
Finite-state machine for an electronic door : Construct a finite-state machine for an electronic door lock that implements the following rules: A user enters a string of three digits, one digit at a time.
Describe the status of botnets in the world : BotLab is a platform at the University of Washington that continually monitors and analyzes the behavior of spam-oriented botnets.
Text mining and sentiment analysis : The purpose of this assignment is to help you learn more about the concepts of Text Mining and Sentiment Analysis.

Reviews

Write a Review

Computer Network Security Questions & Answers

  Describe each of the six stages of the employee life cycle

IT409 IT Security and Policies Assignment. Describe each of the six stages of the employee life cycle using your own words. Define and provide examples for the following using your own words: Information assets

  How can sender and receiver establish new shared secret key

Suppose that the sender and re­ ceiver have never met, but there exists a trusted third party that shares a secret key with the sender and also shares a (different) secret key with the receiver. How can the sender and receiver establish a new shar..

  Describe the steps that are required if a data recovery

Identify the backup software that will be used and how it will be configured. Describe the steps that are required if a data recovery is necessary.

  What sorts of protection is provided by the bank

What sorts of protection is provided by the bank to ensure secure online banking? Justify why the bank would use these security measures.

  Uniform law for computer information transactions

After more than ten years of proposals, revisions and re-revisions, the National Conference of Commissioners on Uniform State Laws at long last voted to adopt the Uniform Computer Information Transactions Act on July 29.

  Discuss intrusion detection and prevention systems

Analyze firewall technology and tools for configuring firewalls and routers. Discuss intrusion detection and prevention systems and Web-filtering technology. Explain the purpose of honeypots.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  How must one-s privacy be legally protected or secured

What does privacy mean to you? Is privacy a right or a privilege? How should one's privacy be legally protected or secured, especially when using the Internet?

  Peer entity authentication security service

Draw a matrix similar to the table presented in class that shows the relationship between security services and attacks - Peer entity authentication security service

  Design a network for the local business

Design a network for the local business based on the information: The business has approximately fifty (50) employees, and the new office space will stretch across the third and fifth floors of a building.

  Ethical concerns in computing

Ethical Concerns in Computing

  Find time when station c hears the collision

The size of the frame is long enough to guarantee the detection of collision by both stations. Find: The time when station C hears the collision (t3).

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd