Question: Understanding the important role that the network and security management plays, please read the Target Breach case study on pages 128130 of the textbook to

Understanding the important role that the network and security management plays, please read the Target Breach case study on pages 128130 of the textbook to respond to the discussion questions.
Respond to the following:
Using your understanding of the network security and management practices, discuss what Target didnt do well in security prevention, detection, and response before and after the incident? What could Target have done to reduce the damage?
Explain why the security is a process and not a product.
 Understanding the important role that the network and security management plays,
please read the Target Breach case study on pages 128130 of the
textbook to respond to the discussion questions. Respond to the following: Using

Chapter 4 Network and Security Management LEARNING OBIECTIVES By the end of this chaptet, you should be able to Describe growth trends in network demand and budgets " Discuss network quality of service (Q05) and be able to specify service level agreement (SL.A) guarantees Design a network layout based on required traffic volumes between sites, considering redundancy Describe options for dealing with momentary traffic peaks Describe and apply strategic security planning principles Describe the importance of centralized network and security management and discuss tools for centralizing network and security management. Explain how software defined networking (SDN) may revolutionize the way that netwoelks are managed and what benefits SDN may bring FAILURES IN THE TARGET BREACH After every breach, companies should pause to take lessons from the experience. This type of reflection, if it leads to appropriate changes, will reduce the odds of similar breaches in the future One lesson from the Target breach is that you cannot trust extemal businesses you deal with to have good security. In the case of Fazio Mechanical Services, an employee fell for a spear phishing attack. This could happen in any company: However, Fazio made it more likely. It used the free consumer version of an antivirus program, Malwarebytes

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!