What factors were responsible for the Target and Equifax breaches? Who should have been responsible for these
Question:
What factors were responsible for the Target and Equifax breaches? Who should have been responsible for these breaches? How do you think the firms could have prevented the attacks, and what should they do in the future to heighten security and win back customer trust?
Fantastic news! We've Found the answer you've been seeking!
Step by Step Answer:
Answer rating: 100% (4 reviews)
The Target and Equifax breaches were significant cybersecurity incidents that exposed sensitive customer data Here are the factors responsible for these breaches the parties that could have been held responsible and some measures that could have been taken to prevent them and rebuild customer trust Target Breach 1 Attack Vector The Target breach occurred in late 2013 and was primarily a result of a cyberattack on the companys pointofsale POS system Attackers gained access to Targets network using credentials stolen from a thirdparty vendor 2 Responsibility Several parties could be held responsible Target itself for inadequate security practices and monitoring The thirdparty vendor Fazio Mechanical Services whose credentials were compromised The attackers who initiated the breach 3 Prevention Improved network segmentation Target could have better isolated its POS system from other parts of its network to limit the scope of the breach Stronger authentication Implement multifactor authentication to protect against credential theft Regular security audits Periodic reviews and assessments of security controls can identify vulnerabilities 4 Rebuilding Trust Improved cybersecurity practices and regular updates to the public about security measures Compensation and support for affected customers Enhanced data protection measures to prevent future breaches Equifax Breach 1 Attack Vector The Equifax breach occurred in 2017 and was a result of a web application vulnerability in the companys website software Attackers exploited this vulnerability to gain access to sensitive customer information 2 Responsibility Equifax The company was widely criticized for not promptly patching a known vulnerability Regulatory bodies and auditors They should have ensured Equifaxs compliance with security standards The attackers responsible for the ...View the full answer
Answered By
PALASH JHANWAR
I am a Chartered Accountant with AIR 45 in CA - IPCC. I am a Merit Holder ( B.Com ). The following is my educational details.
PLEASE ACCESS MY RESUME FROM THE FOLLOWING LINK: https://drive.google.com/file/d/1hYR1uch-ff6MRC_cDB07K6VqY9kQ3SFL/view?usp=sharing
3.80+
3+ Reviews
10+ Question Solved
Related Book For
Information Systems A Managers Guide To Harnessing Technology Version 7.0
ISBN: 9781453394045
1st Edition
Authors: John Gallaugher
Question Posted:
Students also viewed these Computer science questions
-
Googles ease of use and superior search results have propelled the search engine to its num- ber one status, ousting the early dominance of competitors such as WebCrawler and Infos- eek. Even later...
-
In January, the board of directors of the Montgomery Corporation, one of Canada's largest retail store chains, was having its regularly scheduled meeting to establish and declare the next quarterly...
-
Planning is one of the most important management functions in any business. A front office managers first step in planning should involve determine the departments goals. Planning also includes...
-
Draw with Ruler Touch Touch 4x For each of the three simple circuit boards you will need to calculate the total resistance, Req, for the entire circuit board by using the measured resistances of each...
-
1. List some specific employment examples where a postemployment noncompetition agreement would be enforceable. 2. Why did the North Carolina Court of Appeals refuse to enforce the noncompete...
-
The frame supports the distributed load shown. Determine the state of stress acting at point D. Show the results on a differential element at this point. 4 kN/m 20 mm 60 mm BA 20 mm D. 50 mm |-1.5...
-
Repeat the azeotrope formation case study for cyclic (naphthenic) and cyclic (aromatic) compounds that form azeotropes with ethanol. Also, repeat the azeotrope formation case study to identify all...
-
Assume the Federal Interstate Commission began the fiscal year with the following account balances: 1. Congress passed a spending bill providing $12,000,000 to fund the agencys operations for the...
-
Mercier Corporation's stock is selling for $78.99. It has just paid a dividend of $4.25 a share. The expected growth rate in dividends is 5.5 percent. a) What is the required rate of return on this...
-
Why are threats to the power grid potentially so concerning? What are the implications of power grid failure and of property damage? Who might execute these kinds of attacks? What are the...
-
What sorts of security regimes are in use at your university, and at firms you've worked or interned for? If you don't have experience with this, ask a friend or relative for their professional...
-
In January, the payroll supervisor determines that gross earnings for Carlyle Company are $120,000. All earnings are subject to 7.65% FICA taxes, 5.4% state unemployment taxes, and 0.8% federal...
-
Consider a situation with J identical firms that have marginal abatement cost functions for j=1,,J. The marginal damage function is equal to D'(E)=d.EDetermine the optimal allocation and the optimal...
-
In the 1990s, the leader of Germanys Social Democratic Party, Oscar LaFontaine, suggested a type of environmental regulation combining emission taxes with a minimum allowable emission standard....
-
Modify Lookup to make a program LookupAndPut that allows put operations to be specified on standard input. Use the convention that a plus sign indicates that the next two strings typed are the...
-
The Shannon entropy measures the information content of an input string and plays a cornerstone role in information theory and data compression. Given a string of \(n\) characters, let \(f_{c}\) be...
-
Consider a situation where the true aggregate marginal abatement cost curve is given by -C'(E)= a-bE, and the marginal damage function by D'(E)= d.E. The regulator believes the true marginal...
-
Reichard Company establishes a $250 petty cash fund on September 9. On September 30, the fund shows $34 in cash along with receipts for the following expenditures: transportation-in, $47; postage...
-
Write the expression in radical notation. Then evaluate the expression when the result is an integer. 23 -1/2
-
Consider two networks, N1 and N2, that have the same average delay between a source A and a destination D. In N1, the delay experienced by different packets is unformly distributed with maximum delay...
-
In Fig. 6-36 we saw that in addition to the 32-bit acknowledgement field, there is an ACK bit in the fourth word. Does this really add anything? Why or why not? Figure 6-36 32 Bits Source port...
-
Describe two ways to get into the SYN RCVD state of Fig. 6-39. Figure 6-39 (Start) CONNECT/SYN (Step 1 of the 3-way handshake) CLOSED CLOSE/- LISTEN/- CLOSE/- SYN/SYN + ACK LISTEN (Step 2 of the...
-
Lookup the Case Study Mentioned Below and Answer questions: Improving Patient Care in a Changing Environment: A Teaching Case By: William B. Weeks, MD, MBA Questions : Discuss at least 1 problem in...
-
Present the two most important steps/actions in an investigation of an employee. In other words, to what two aspects of the investigatory process should a human resource professional pay most...
-
Suppose {x}1 C R and xi > xi+1 for all i = 1, 2, 3, .... Show that there is an x* [-, 0) such that x; converges to x*. That is {xi}; 1 x*, though perhaps x* ==.
Study smarter with the SolutionInn App