Question: Using the information bellow - answer bullet points. What are the risk types associated with this incident. What are the primary performance characteristics of an
Using the information bellow - answer bullet points.
- What are the risk types associated with this incident.
- What are the primary performance characteristics of an appropriate organization-wide risk management system?
- Tell what could the company have done better to approached strategic risk management to avoid this scenario?
- What could the company have done to better approached the defining risk appetite and tolerance in this scenario?
The systems and networks of Target Corp. were breached in November and December, 2013, which results in 40 million card numbers and 70 million personal records stolen [9]. Multiple parties get involved in the federal investigation of the incident. The list includes United State Secret Service, iSIGHT Partners, DELL Secure- Works, Seculert, the FBI, etc. In addition, companies like HP, McAfee and IntelCrawler provide analysis of the discovered malware, i.e., BlackPOS, and the marketing of the stolen cards.
There are multiple theories on how the criminals ini- tially hacked into Target, and none of them have yet been confirmed by Target Corporation. However, the primary and most well-supported theory is that the initial breach didnt actually occur inside Target [10].
At some point the Fazio Mechanical Services system was compromised by what is believed to be a Citadel Trojan [11]. This Trojan was initially installed through a phishing attempt. Due to the poor security training and security system of the third party, the Trojan gave the attackers full range of power over the companys system [10]. It is not known if Fazio Mechanical Services was targeted, or if it was part of a larger phishing attack to which it just happened to fall victim. But it is certain that Fazio Mechanical had access to Targets Ariba external billing system, or the business section of Target network.
Instead, it occurred in a third party vendor, Fazio Me- chanical Services, which is a heating, ventilation, and air-conditioning firm. According to this theory, we present the timeline of the incident in Fig. 1 and steps of the plot in Fig. 2. Attackers first penetrated into the Target network with compromised credentials from Fazio Mechanical. Then they probed the Target network and pinpointed weak points to exploit. Some vulnerabilities were used to gain access to the sensitive data, and others were used to build the bridge transferring data out of Target. Due to the weak segmentation between non-sensitive and sensitive networks inside Target, the attackers accessed the point of sale networks.

Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
