Question: This Case covers the Target Data Breach in this course from the International Journal of Case Studies in Management HECT 1 3 1 , Autopsy
This Case covers the Target Data Breach in this course from the International Journal of Case Studies in Management HECT "Autopsy of a Data Breach; The Target Case", by Line Dube, An pdf of this case is provided below;
Part A
What steps did the cybercriminals follow in committing this theft? What are some of the factors that allowed for this theft to take place?
Part B
As the saying goes, "Hindsight is always twentytwenty". Please identify and briefly explain three techniques from chapter or chapter or from other textbook chapters for that matter that you believe could have reduced the likelihood and or prevented this data breach from taking place? There are numerous techniques discussed in these materials. The techniques can be technical, business policy, or audit practice related.
What are three negative consequences as a result of this data breach? What are three positive effects as a result of this data breach?
Part C
What is your opinion? Do you believe that a Risk Assessment by the IT Organization would have properly prepared the organization for this type of situation? Why or Why Not?
What controls measures could Target put into place to reduced the likelihood of this data breach from taking place moving forward? Please identify two to three control measures for each of the following;
a Incompetent employees
b hackers
c business partners
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
