logo

Assignment Cover Sheet for Turnitin Similarity Analysis

9 Pages2368 Words113 Views
   

Added on  2021-04-29

About This Document

Student Details Student Number 1 0 4 9 8 7 4 3 Family Name Given Name UnitDetails Unit Code CSI2102 Unit Title Information Security Name of Lecturer Dr Liau Vui Kieu Due Date 24 June 2019 Topic of Assignment A analysis of Target Data breach and lessons learned Groupor Tutorial(if applicable) Course Bachelors of Science in Cyber Security (FT) Campus Singapore I certify that the attached assignment is my own work and that any material drawn from other sources has been acknowledged. This entire breach

Assignment Cover Sheet for Turnitin Similarity Analysis

   Added on 2021-04-29

ShareRelated Documents
Assignment Cover SheetThe information on this coversheet will be included in Turnitin’s similarity analysis; however, your lecturers are aware of this and will disregard it.Student DetailsStudent Number 10498743Family NameGiven NameUnitDetailsUnit CodeCSI2102Unit TitleInformation SecurityName of LecturerDr Liau Vui KieuDue Date24 June 2019Topic of AssignmentA analysis of Target Data breach and lessons learnedGroupor Tutorial(if applicable)CourseBachelors of Science in Cyber Security (FT) CampusSingaporeI certify that the attached assignment is my own work and that any material drawn from other sources has beenacknowledged. This work has not previously been submitted for assessment in any other unit or course.Copyright in assignments remains my property .I grant permission to the University to make copies ofassignments for assessment, review and/or record keeping purposes. I note that the University reserves the rightto check my assignment for plagiarism .Should there production of all or part of an assignment be required by theUniversity for any purpose other than those mentioned above, appropriate authorisation will be sought from me onthe relevant form.ManualSubmissionIf handing in an assignment in a paper or other physical form,sign here to indicate that you have read this form,filled it in completely and that you certify as above.SignatureDateElectronicSubmissionOR,if submitting this paper electronically as per instructions for the unit, place an Xin the box below to indicate that you have read this form and filled it in completely and that you certify as above. Please include this page with your submission. Any responses to this submission will be sent to your ECU email address.AgreementXselect checkboxDate23 June 2019For procedures and penalties on late assignments please refer to the University Admission, Enrolment and Academic ProgressRules- rule 24, and the ECU Course and Unit Delivery and Assessment PolicyThe information on this coversheet will be included in Turnitin’s similarity analysis; however, your lecturers are awareof this and will disregard it.
Assignment Cover Sheet for Turnitin Similarity Analysis_1
ContentsAssignment Cover Sheet...................................................................................................................1Introduction..........................................................................................................................................3Data breach background.......................................................................................................................3How it happened...................................................................................................................................3Mind Map..............................................................................................................................................4CIA.........................................................................................................................................................5Protections............................................................................................................................................6In place..............................................................................................................................................6Failed.................................................................................................................................................6Respond from Target Corporation.........................................................................................................7Legal and Ethical consequences............................................................................................................7Conclusion.............................................................................................................................................8References.............................................................................................................................................8
Assignment Cover Sheet for Turnitin Similarity Analysis_2
IntroductionIn this digital era information plays a vital role everywhere. Starts from small sizedorganisation to enterprise organisation everything relied on this information. This reportcontains the following, firstly the background which explains how the data breach took place.Then the report explains the threats have been faced in this breach. After it explains the CIAprinciples related it in this particular breach and it explains the protections were there andreason for failures. Then this report continues to the ethical and legal issues in this and endswith conclusion.Data breach backgroundTarget Corporation is a well ranked store retailer in United States. The company operatesalmost 1844 stores all over the globe. The given case study explains about the data breachhappened at Target Corporation in 2013. During this data breach over 70 million individualuser details such as mailing addresses, names, email address, phone numbers, and credit anddebit card account data were stolen. This data breach resulted in second largest credit carddetail theft in United States. Credit card information includes Encrypted pins, Customernames, Credit card numbers, Credit card expiration date, embedded code on credit cardsmagnetic strip. This entire breach is a result of human error and failure of educating basicsecurity practices required.How it happenedThe beginning of this data breach starts with Phishing attack. In Phishing attack theintruder/hacker will send a fake email/message which looks like from an official source. Themain motive of this phishing attack is to steal sensitive data from the user (Security, n.d.). Byusing this same method the intruders/hackers targeted a third party air-conditioning firmvendor Fazio Mechanical Services. Due to poor security practices this third party vendor fellin this phishing attack and certainly installed the malware called Citadel which is a passwordstealing bot program. Using this malware the intruders/hackers gained access to TargetCooperation’s network. Once, they gained access to the network they exploited poor segmentation of targetcooperation’s network which had no separate segmented network for the sensitiveinformation. This poor network management made the work easy. Once they exploited this
Assignment Cover Sheet for Turnitin Similarity Analysis_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Emerging Computer Technologies - Assignment
|25
|5403
|396

Assignment Cover Sheet
|17
|4845
|142

Business System Analysis | Turnitin’s Similarity Analysis
|17
|4461
|12

Project Integration Management PDF
|11
|2630
|114

Position Tracking Of an Athlete Using IMU, Magneto Meter (GPS) and UWB
|41
|9434
|55

Assignment Cover Sheet
|21
|4093
|386