What factors were responsible for the Target and Equifax breaches? Who should have been responsible for these
Question:
What factors were responsible for the Target and Equifax breaches? Who should have been responsible for these breaches? How do you think the firms could have prevented the attacks, and what should they do in the future to heighten security and win back customer trust?
Fantastic news! We've Found the answer you've been seeking!
Step by Step Answer:
Answer rating: 100% (5 reviews)
The Target and Equifax breaches were significant cybersecurity incidents that exposed sensitive customer data Here are the factors responsible for these breaches the parties that could have been held responsible and some measures that could have been taken to prevent them and rebuild customer trust Target Breach 1 Attack Vector The Target breach occurred in late 2013 and was primarily a result of a cyberattack on the companys pointofsale POS system Attackers gained access to Targets network using credentials stolen from a thirdparty vendor 2 Responsibility Several parties could be held responsible Target itself for inadequate security practices and monitoring The thirdparty vendor Fazio Mechanical Services whose credentials were compromised The attackers who initiated the breach 3 Prevention Improved network segmentation Target could have better isolated its POS system from other parts of its network to limit the scope of the breach Stronger authentication Implement multifactor authentication to protect against credential theft Regular security audits Periodic reviews and assessments of security controls can identify vulnerabilities 4 Rebuilding Trust Improved cybersecurity practices and regular updates to the public about security measures Compensation and support for affected customers Enhanced data protection measures to prevent future breaches Equifax Breach 1 Attack Vector The Equifax breach occurred in 2017 and was a result of a web application vulnerability in the companys website software Attackers exploited this vulnerability to gain access to sensitive customer information 2 Responsibility Equifax The company was widely criticized for not promptly patching a known vulnerability Regulatory bodies and auditors They should have ensured Equifaxs compliance with security standards The attackers responsible for the ...View the full answer
Answered By
PALASH JHANWAR
I am a Chartered Accountant with AIR 45 in CA - IPCC. I am a Merit Holder ( B.Com ). The following is my educational details.
PLEASE ACCESS MY RESUME FROM THE FOLLOWING LINK: https://drive.google.com/file/d/1hYR1uch-ff6MRC_cDB07K6VqY9kQ3SFL/view?usp=sharing
3.80+
3+ Reviews
10+ Question Solved
Related Book For
Information Systems A Managers Guide To Harnessing Technology Version 7.0
ISBN: 9781453394045
1st Edition
Authors: John Gallaugher
Question Posted:
Students also viewed these Computer science questions
-
Googles ease of use and superior search results have propelled the search engine to its num- ber one status, ousting the early dominance of competitors such as WebCrawler and Infos- eek. Even later...
-
In January, the board of directors of the Montgomery Corporation, one of Canada's largest retail store chains, was having its regularly scheduled meeting to establish and declare the next quarterly...
-
Planning is one of the most important management functions in any business. A front office managers first step in planning should involve determine the departments goals. Planning also includes...
-
Draw with Ruler Touch Touch 4x For each of the three simple circuit boards you will need to calculate the total resistance, Req, for the entire circuit board by using the measured resistances of each...
-
1. List some specific employment examples where a postemployment noncompetition agreement would be enforceable. 2. Why did the North Carolina Court of Appeals refuse to enforce the noncompete...
-
The PTRA facilitated the marketing of generic drugs by allowing generic drug sponsors to file ANDAs rather than NDAs. This case provides additional insight into the procedures followed by the FDA to...
-
Fill in the Blank. Piezoelectric transducers generate electrical ______________ when subjected to mechanical stress.
-
Analysis of Receivables Presented below is information for Grant Company. 1. Beginning-of-the-year Accounts Receivable balance was $15,000. 2. Net sales (all on account) for the year were $100,000....
-
On 1 / 1 / 2 0 1 8 , XYZ Inc. purchased 1 0 % of Rail Corp. ' s outstanding shares. During 2 0 1 8 , Rail Corp. reported an income of $ 5 0 , 0 0 0 and paid dividends of $ 1 0 , 0 0 0 . The market...
-
Why are threats to the power grid potentially so concerning? What are the implications of power grid failure and of property damage? Who might execute these kinds of attacks? What are the...
-
What sorts of security regimes are in use at your university, and at firms you've worked or interned for? If you don't have experience with this, ask a friend or relative for their professional...
-
How much may be contributed to an IRA on an annual basis?
-
Using both versions of Newton's version of Kepler's 3rd Law solve the following problem. You discover a planet orbiting a distant sun-like star (That has about the same mass as the sun), with an...
-
A warehouse worker must push a hand cart loaded with cases of textbooks. The total weight of the cart and textbooks is 480 lbs. If the worker weighs 180 lbs. and a horizontal force of 80 lbs must be...
-
To provide the pulse of energy needed for an intense bass, some car stereo systems add capacitors. One system uses a 1.6F capacitor charged to 24 V , double the normal 12 V provided by the car's...
-
On Slim Jims last cave adventure he accidentally dropped his lantern while studying a formation of stalactites. The lantern was dropped from 3 5 m up . How fast was it going when it smashed into the...
-
D A 60 m long, 120 kg steel cable is connected to two poles. The tension force in the cable is 1,027 N. The wind makes the cable vibrate with a frequency of 1.5 Hz. What is the wavelength of the...
-
Calculate a value for the equilibrium constant for the reaction O2(g) + O(g) O3(g) given that NO2(g) NO(g) + O(g) K = 6.8 10-49 O3(g) + NO(g) NO2(g) + O2(g) K = 5.8 10-34
-
Write the expression in radical notation. Then evaluate the expression when the result is an integer. 23 -1/2
-
Consider two networks, N1 and N2, that have the same average delay between a source A and a destination D. In N1, the delay experienced by different packets is unformly distributed with maximum delay...
-
In Fig. 6-36 we saw that in addition to the 32-bit acknowledgement field, there is an ACK bit in the fourth word. Does this really add anything? Why or why not? Figure 6-36 32 Bits Source port...
-
Describe two ways to get into the SYN RCVD state of Fig. 6-39. Figure 6-39 (Start) CONNECT/SYN (Step 1 of the 3-way handshake) CLOSED CLOSE/- LISTEN/- CLOSE/- SYN/SYN + ACK LISTEN (Step 2 of the...
-
3. Please write a short paragraph explaining the scientific description of psychobiological function (idealism, materialism and dualism) discussed in class and read about in text that you think best...
-
(a) In the proof of Lemma 7.2.2 it is claimed that for some integers x, y, ax+py = 1. Based on this proof, give a different, much shorter proof of Lemma 7.2.9 that uses gcd (s, u) = 1. (b) Assume d =...
-
Summarize the study and interpret its findings for a lay audience. Focus on objectively translating this study for a lay audience. Consider how this study relates to current and emerging issues in...
Study smarter with the SolutionInn App