Analyze the approach taken by the attackers to gain access

Assignment Help Management Information Sys
Reference no: EM131481617 , Length: 3

During the Christmas holiday shopping season in 2013, Target Corporation revealed that it had been the victim of a massive data breach, which compromised the identities of millions of their customers.

While Target had the misfortune of being the first to reveal the breach, it was later discovered, in a much less public way, that other retailers had been victims of the same attack.

Engage in research on this particular data breach and learn as much as you can about the circumstances, sources, and methods that were used in this attack.

When you have completed that research and the study activities related to security principles, apply those principles to what you have learned about the attack.

Write a 2-3 page paper discussing the areas of vulnerability that were exploited and what security principles failed, providing a gateway into the information assets of Target Corporation and other retailers. As part of your discussion:

Analyze the approach taken by the attackers to gain access to this data.

Analyze the failures in the security principles that made the organization vulnerable to this attack.

Explain how this attack could have been prevented without impacting user productivity or customer satisfaction.

Explain how the security principles can be applied in order to enforce policy and prevent a future breach.

Assignment Requirements

Written communication: Written communication is free of errors that detract from the overall message.

APA formatting: Resources and citations are formatted according to APA (6th edition) style and formatting.

Length of paper: 2-3 pages, excluding the references page.

Font and font size: Times New Roman, 12 point.

Reference no: EM131481617

Questions Cloud

Define relationship between inflation and unemployment rates : Use the aggregate demand-aggregate supply model to illustrate the downward-sloping relationship between inflation and unemployment rates in the short-run.
Why you believe similar key management concept tend to recur : Consider key tenets of well-known management systems. Why you believe similar, key management concept tend to recur in the various management systems standards.
Discuss current trends in medical technology : Research and discuss 1 piece of federal legislation that has affected the use of medical technology.
Describe change in the price level and the unemployment rate : Suppose the economy is in long-run equilibrium, with real GDP at $16 trillion and the unemployment rate at 5%. Now assume that the central bank unexpectedly.
Analyze the approach taken by the attackers to gain access : Analyze the failures in the security principles that made the organization vulnerable to this attack.
Illustrate the short-run effects on the macro economy : Suppose the economy is in long-run equilibrium, with real GDP at $16 trillion and the unemployment rate at 5%. Now assume that the central bank increases.
What makes pollution prevention difficult in practice : What makes pollution prevention difficult in practice? How is pollution prevention different from end-of-pipe emissions control?
Which of the following is an example of lost update : Julia has an exclusive lock on the savings account and Bill is trying to perform an action requesting a shared lock on the same data.
Describe the effect on the economy during election years : In the past, some people believed that the Federal Reserve routinely expanded the money supply during presidential election years in order to stimulate.

Reviews

Write a Review

Management Information Sys Questions & Answers

  What is the nationwide health information network

What has been the role of Office of the National Coordinator (ONC) for Health IT in data standards and interoperability? What is the Nationwide Health Information Network

  Discuss about the case study given below

ITNI 6660: The 1S1T function is being globalized with functions being centralized, co-located. decentralized. and visualized in different divisions throughout the world. You have been challenged with the task of doing an action research oriented f..

  Describe your plan for the overall look of ecommerce website

Write 1-2 paragraphs describing your plan for the overall look and feel of your ecommerce website, specifying any fonts or color schemes you want to employ.

  Consider the potential future of the energy economy on a

consider the potential future of the energy economy on a global scale. describe the future path of the economics of oil

  Explain what you believe are three most important concerns

Explain what you believe are the three most important concerns when it comes to mobile devices in the workplace. Justify your response.

  Which were most difficult to specify in terms of a scenario

Stimulus. The stimulus is a condition that needs to be considered when it arrives at a system.

  Determine which tunneling protocol you would recommend

Suppose you work for a company that wants to implement a Virtual Private Networks (VPN) for telecommuters. Determine which tunneling protocol you would recommend and explain why.

  Explain and define the following components

As you continue to review the functionality of various operating systems, you also have to look at various components of the computers to ensure that your selected operating system (OS) is compatible with the hardware deployed in your environment...

  Determine a proper control chart.

Determine a proper control chart. Use a spreadsheet to calculate the upper and lowercontrol limits for the control chart and draw it. Suppose that the next carpet sample of100 yards has 14 flaws. What can you say about the process?

  How many location-based service apps do you have

How many location-based service apps do you have on your smartphone? How often do you use them and why

  What are the data entities of this enterprise

Consider a student club or organization in which you are a member. What are the data entities of this enterprise? List and define each entity. Then, develop an enterprise data model showing these entities and important relationships between them.

  What moral theory-utilitarianism egoism

Consider the concepts of utilitarianism, egoism, and social contract. What moral theory-utilitarianism, egoism, or social contract-is consistent with cooperating with the other prisoner and rejecting self-interest as the best option? What is the r..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd