Question: Link: https://www.sans.org/reading-room/whitepapers/casestudies/case-study-critical-controls-prevented-target-breach-35412 Question Thread #5A: What do you think is meant by Controls? The author of this article describing the Target data breach is arguing
Link:
https://www.sans.org/reading-room/whitepapers/casestudies/case-study-critical-controls-prevented-target-breach-35412
Question Thread #5A: What do you think is meant by "Controls"?
The author of this article describing the Target data breach is arguing that different controls could have prevented this bad event for Target.
Before we can agree or disagree with the author's premise: What does author means by the terms "controls" in the Target situation?
Question Thread#5B: Threats demonstrated by the Target data breach
In describing the attack vectors of the Target data breach, what kinds of different threats to an information system is the author telling about?
Question Thread #1C: The "ilities" at Target
Forgetting about controls, IT security and threats for a moment, let's just consider Target's information systems infrastructure as a mass retailer.
or Target's IT, which of the "ilities" is the most important for the agility of its IT infrastructure?
Which of these "ilities" is least significant?
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
