logo

Target Data Breach: Threats, Protections, and Legal/Ethical Issues

This assignment is a case study on the Target data breach, where students are required to evaluate the advantages, disadvantages, threats, and vulnerabilities associated with various IT environments, apply concepts and techniques relating to information security, synthesize data from various sources, identify the importance of information to organizations and society, and analyze the ethical and legal issues associated with information security.

8 Pages1725 Words99 Views
   

Added on  2022-12-30

About This Document

This article discusses the Target data breach, which occurred in 2013 and resulted in the theft of millions of confidential information and credit/debit card numbers. It explores the threats faced by Target, the CIA triad related to the breach, protections in place to prevent future breaches, and the legal and ethical issues surrounding the breach. The article also provides references for further reading.

Target Data Breach: Threats, Protections, and Legal/Ethical Issues

This assignment is a case study on the Target data breach, where students are required to evaluate the advantages, disadvantages, threats, and vulnerabilities associated with various IT environments, apply concepts and techniques relating to information security, synthesize data from various sources, identify the importance of information to organizations and society, and analyze the ethical and legal issues associated with information security.

   Added on 2022-12-30

ShareRelated Documents
Running head: CSI2102- INFORMATION SECURITY
CSI2102- INFORMATION SECURITY
Name of student
Name of university
Author’s note:
Target Data Breach: Threats, Protections, and Legal/Ethical Issues_1
1
CSI2102- INFORMATION SECURITY
Table of Contents
Introduction....................................................................................................................2
Threat faced by Target...................................................................................................2
CIA triad related to Security breach...............................................................................3
Protections present to prevent breach............................................................................5
Legal and Ethical issues related to the breach...............................................................6
References......................................................................................................................7
Target Data Breach: Threats, Protections, and Legal/Ethical Issues_2
2
CSI2102- INFORMATION SECURITY
Introduction
A network of Target Corporation was breached during 27th November and 18th
December, 2013. This was the second largest breach of debit and credit cards. In this target
breach, 70 million confidential information were stolen along with 40 million numbers of
debit and credit card were stolen. In 2014, several other target breaches were reported around
568 data were stolen (In, 2015). The division of Target Security protects the network and
system again all the threats of cyber like exfiltration and malware. A popular service of
malware detection was intruded which was named as FireEye. This service was cooperated
by CIA at the time of its development.
Threat faced by Target
Figure: Concept map
Target Data Breach: Threats, Protections, and Legal/Ethical Issues_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Information Security Case Study
|9
|1388
|70

Security Issues in Information Technology (pdf)
|12
|2988
|346

Cybersecurity Threat Name of the Student
|11
|2321
|49

Security Audit and Testing Article 2022
|6
|1454
|12

Research paper on Target breach
|9
|1435
|410

CJ 4472 - Cyber Security Breaches - Case Study
|9
|2593
|39