Discuss the areas of vulnerability

Assignment Help Management Information Sys
Reference no: EM131801539 , Length: 3

• Application of Security Principles

During the Christmas holiday shopping season in 2013, Target Corporation revealed that it had been the victim of a massive data breach, which compromised the identities of millions of their customers.

While Target had the misfortune of being the first to reveal the breach, it was later discovered, in a much less public way, that other retailers had been victims of the same attack.

Engage in research on this particular data breach and learn as much as you can about the circumstances, sources, and methods that were used in this attack.

When you have completed that research and the study activities related to security principles, apply those principles to what you have learned about the attack.

Write a 2"3 page paper discussing the areas of vulnerability that were exploited and what security principles failed, providing a gateway into the information assets of Target Corporation and other retailers. As part of your discussion:

• Analyze the approach taken by the attackers to gain access to this data.

• Analyze the failures in the security principles that made the organization vulnerable to this attack.

• Explain how this attack could have been prevented without impacting user productivity or customer satisfaction.

• Explain how the security principles can be applied in order to enforce policy and prevent a future breach.

Assignment Requirements

• Written communication: Written communication is free of errors that detract from the overall message.

• APA formatting: Resources and citations are formatted according to APA (6th edition) style and formatting.

• Length of paper: 2-3 pages, excluding the references page.

• Font and font size: Times New Roman, 12 point.

• Required Reading

The required reading is foundational to the concepts of security principles, which will support the Unit 1 assignment.

• Use Information Security Management Handbook to read the following:

o Chapter 3, "Appreciating Organizational Behavior and Institutions to Solidify Your Information Security Program," pages 29-46.

o Chapter 4, "The Information Security Auditors Have Arrived-Now What?," pages 47-62.

• Use Systems Security Engineering: An Integrated Approach to Building Trustworthy Resilient Systems to read Chapter 2, "The Fundamentals," pages 5-32.

• Web Resources

Video

The objective of this video is to demonstrate some practical application of the information security principles that were covered in the required reading.

• Security Principles Versus the Real World (54 minutes).

Internet and Library Research

Use the following keywords to research the history of the information security profession in preparation for participating in the unit discussion:

• History of information security.

• Information security evolution.

• Computer security history.

• Computer security founders.

• Information security founders.

Reference no: EM131801539

Questions Cloud

Create a balance sheet for events and transactions : Create a balance sheet for the following items, Events and transactions
What will be george and marthas child tax credit : George and Martha are married and file a joint return claiming their two children, ages 10 and 8. What will be George and Martha's 2016 child tax credit?
Find the linear regression equation for hourly earnings : Find the linear regression equation for hourly earnings as a function of time (with x = 0 representing 1970).
Implement teams throughout your division on trial basis : Your organization?s president has read a lot about teams in the popular press and wants to implement teams throughout your division on a trial basis.
Discuss the areas of vulnerability : Write a 2-3 page paper discussing the areas of vulnerability that were exploited and what security principles failed.
How can the irs manage tax prepares better : How can the IRS manage tax prepares better. There are many software programs out there now and many tax services that "pop-up" during tax season
Effects on productivity of an increased capital investment : Interpret the graphs in parts (b) and (d) with regard to what they say about the effects on productivity of an increased capital investment (part b).
Outline how the new lower materiality level will affect : Outline how the new lower materiality level will affect the nature and extent of audit procedures planned.
What are the major barriers to their advancement : Why is the glass ceiling metaphor inadequate for explaining women?s lack of progress in reaching the C-suite? What are the major barriers to their advancement?

Reviews

Write a Review

Management Information Sys Questions & Answers

  Briefly describes the strategies of internationalization

Briefly describes the strategies of internationalization of the company: "Home-replication, Global, Multi-domestic, and Transnational"

  What are some advantages of using a cloud-based solution

What are some advantages of using a cloud-based solution? Would this be something your past or current organization could utilize? Why or why not?

  Measure the success of the it systems

Choose any of the Perspective boxes or the opening case and identify and describe at least seven metrics that could be used to measure the success of the IT systems in your chosen example.

  What is an rfp and how is this different from an rfi

What are the differences between the time-and-arrangements, fixed-price, and value-added contracts for outsourcing? What is an RFP? How is this different from an RFI

  Context diagram vs case diagramcompare and contrast a

context diagram vs. case diagramcompare and contrast a context diagram using data flow diagram dfd modeling and a use

  What benefits are expected to be provided by is

Investigating Information Systems-What benefits are expected to be provided by IS

  Identify the means of hacking web browsers

Describe security concerns, tools, and techniques associated with Web servers and Web applications. Identify the means of hacking Web browsers.

  Describe the methodology or purpose of the policy

What types of security policies and procedures does your place of employment have in place for campus information systems?

  Explain how does data leakage occur in an organization

The focus of the research paper is Data Leakage. How does data leakage occur in an organization? What are the common causes of this problem? How would use address this troublesome trend?

  Estimate the total cost for the project

Estimate the costs for the resources, and add the costs to the resource information in the Microsoft Project file. Estimate the total cost for the project, using the Microsoft Project budget or cost reports.

  Explain what an enterprise system solution is in general

Explain what an enterprise system solution is in general (one paragraph)and how such a system would help CIC (one paragraph).

  Explaining what a supply chain is and the 4 key

explaining what a supply chain is and the 4 key driversexplain what a supply chain is and the importance of a supply

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd