Question: This Case covers the Target Data Breach in this course from the International Journal of Case Studies in Management HECT 1 3 1 , Autopsy

This Case covers the Target Data Breach in this course from the International Journal of Case Studies in Management HECT131, "Autopsy of a Data Breach; The Target Case", by Line Dube, An pdf of this case is provided below;
Part A
What steps did the cybercriminals follow in committing this theft? What are some of the factors that allowed for this theft to take place?
Part B
2. As the saying goes, "Hindsight is always twenty-twenty". Please identify and briefly explain three techniques from chapter 3 or chapter 4(or from other textbook chapters for that matter) that you believe could have reduced the likelihood and / or prevented this data breach from taking place? There are numerous techniques discussed in these materials. The techniques can be technical, business policy, or audit practice related.
3. What are three negative consequences as a result of this data breach? What are three positive effects as a result of this data breach?
Part C
4. What is your opinion? Do you believe that a Risk Assessment by the IT Organization would have properly prepared the organization for this type of situation? Why or Why Not?
5. What controls measures could Target put into place to reduced the likelihood of this data breach from taking place moving forward? Please identify two to three control measures for each of the following;
a) Incompetent employees
b) hackers
c) business partners
 This Case covers the Target Data Breach in this course from

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related General Management Questions!