Question: 1) identify the different hacking techniques that were used 2) how could the company have protected itself better against this type of attack? Finally, using
Chapter Five Case: Targeting Target The biggest retail hack in U.S. history wasn't particularly inventive, nor did it appear destined for success. In the days prior to Thanksgiving 2013, someone installed malware in Target's security and payments system designed to steal every credit card used at the company's 1,797 U.S. stores. At the critical moment-when the Christmas gifts had been scanned and bagged and the cashier asked for a swipe-the malware would step in, capture the shopper's credit card number, and store it on a Target server commandeered by the hackers. It's a measure of how common these crimes have become, and how conventional the hackers' approach in this case, that Target was prepared for such an attack. Six months earlier, the company began installing a $1.6 million malware detection tool made by the computer security firm FireEye, whose customers also include the CIA and the Pentagon. Target had a team of security specialists in Bangalore to monitor its computers around the clock. If Bangalore noticed anything suspicious, Target's security operations center in Minneapolis would be notified. On Saturday, Nov. 30, 2013, the hackers had set their traps and had just one thing to do before the attack: plan the data's escape route. As they uploaded exfiltration malware to move starting
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
