Was the home depot incident handled correctly or incorrectly

Assignment Help Computer Engineering
Reference no: EM133547645

Discussion Post: Incident Response Plan

Incident response is an important component in a security awareness program. While not all incidents can be prevented, incident response capabilities can promptly detect and reduce the losses resulting from security attacks.

In September 2014, Home Depot stated that over 56 million credit cards had been compromised in a five-month cyber-attack on their payment systems. This attack simply highlighted the vulnerability of the U.S. retail store's payment systems. Research the Home Depot incident and reflect on the basic elements of an incident response plan and the attack vectors.

In your initial post, answer the following questions:

1) Was the Home Depot incident handled correctly? Incorrectly?
2) Could more have been done? If so, what?

Reference no: EM133547645

Questions Cloud

How can medical professionals protect themselves : How can medical professionals protect themselves, and the practice as much as possible from these litigious acts
Which provides psychological foundations for understanding : describes the means-end chain, which provides the psychological foundations for understanding value creation from a customer perspective.
How does she spin this to point blame at sarah osborne : In Sarah Good's initial testimony (document 63.2) in February 1692, what excuse does she give for "muttering away from persons houses[sic]?
Describe what you have done and what you have observed : Describe what you have done and what you have observed. You also need to provide explanation to the observations that are interesting or surprising.
Was the home depot incident handled correctly or incorrectly : Was the Home Depot incident handled correctly? Incorrectly? Could more have been done? If so, what?
Discuss using examples what is the path-goal theory : explain and discuss using examples what is the Path-Goal theory, developed by Robert House (1971). Explain what is the Goal - Setting Theory and any limitations
How you provide access to network based on user credentials : How you can provide access to the network based on user credentials, maintain control over access points, and detect access attempts by unauthorized users.
How would use the program administration scale : How you would use the Program Administration Scale as an administrator to inform your work as an administrator of an early childhood program.
Key differences between leadership and management roles : CIPD 5OS06 Leadership and management development - developing the right culture and behaviours to establish a working environment which cohesive, diverse

Reviews

Write a Review

Computer Engineering Questions & Answers

  What is the minimum network design you recommend

Two switches are 700 feet apart. They need to communicate at 2.1 Gbps. What is the minimum network design you recommend?

  Discuss the various methods and capabilities of apm

Application portfolio management (APM) represents a process of continual refinement. Discuss the various methods and capabilities of APM.

  Discussing the foundations of data mining

In this assignment you will write a 5 page paper discussing the "Foundations of Data Mining". The paper will compare "Data Mining" to "Traditional Business.

  Analyze the various activities required for the project

CIS554Analyze the various activities required for this project and provide an estimate of duration for each activity based on the number of resources available.

  What will be the appropriate type of printer to use

How best can employees in an open plan of?ce secure print jobs on a shared printer? What will be the appropriate type of printer to use in a public library?

  Write about fractional ownership and its relation

Write at least 500 words on fractional ownership and it's relation to cloud computing. Use at least one example from another industry.

  Which networking component includes a device driver

Each core in a multicore processor counts toward the maximum number of processors that Windows Server 2012/R2 Foundation Edition supports.

  Operate and perform simple os administration

Demonstrate competency in the use of a command line interface to operate and perform simple OS administration and Create programs based on incremental

  What are the potential consequences for a company which has

what are the potential consequences for a company that has data that is not secure? do some research and describe some

  Examine the advantage of using a gantt chart over pert chart

Examine the advantages of using a Gantt chart over a PERT chart and vice versa. Determine when it is appropriate to use one over the other.

  Develop a program for a car rental company called mrrc

For this assignment your task is to develop a program for a car rental company called Mates Rates Rent a Car (MRRC) to help the operators of the company.

  Determine what is meant by an ids and an ips

In no less than 250 words, explain what is meant by an IDS and an IPS. How are they different? How are they connected to a network? List a few examples of IDS.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd