logo

Data Breach of 21st Century

15 Pages3719 Words94 Views
   

Added on  2023-01-23

About This Document

This report discusses the major data breach incidents at Heartland Payment Systems and Target Stores, analyzing the vulnerabilities, responsibilities, and mitigation strategies. It provides insights into the impact of these breaches on customer data and suggests risk mitigation techniques for organizations.

Data Breach of 21st Century

   Added on 2023-01-23

ShareRelated Documents
Running head: DATA BREACH OF 21ST CENTURY
Data Breach of 21st Century
Name of the student:
Name of the university:
Author Note:
Data Breach of 21st Century_1
1DATA BREACH OF 21ST CENTURY
Executive Summary
The main aspect of this report is to deal with the security data braches that happened recently
in the organizations of Heartland Payment Systems and Target Stores. This report puts a clear
reflection on the analysis of these data breach incidents as well assessments are provided in
this report for the stated organizations. Moreover, this report also suggests about some risk
mitigation strategies for this type of organizations, which can be adapted to restrict this type
of incidents.
Data Breach of 21st Century_2
2DATA BREACH OF 21ST CENTURY
Table of Contents
1. Introduction............................................................................................................................3
2. Data Breach at various organizations.....................................................................................3
2.1 Heartland Payment Systems.............................................................................................3
2.1.1 How the attack occur.................................................................................................5
2.1.2 Vulnerabilities faced.................................................................................................5
2.1.3 Responsibility and reason of target...........................................................................5
2.1.4 Was it avoidable?......................................................................................................6
2.1.5 Can Cyber Insurance mitigate the risk......................................................................6
2.2 Target Stores....................................................................................................................6
2.2.1 How the attack occur.................................................................................................7
2.2.2 Vulnerabilities faced.................................................................................................7
2.2.3 Responsibility and reason of target...........................................................................8
2.2.4 Was it avoidable?......................................................................................................8
2.2.5 Can Cyber Insurance mitigate the risk......................................................................8
3. Similarities and Dissimilarities in the above organizations...................................................8
4. Mitigation techniques for future...........................................................................................10
5. Conclusion............................................................................................................................11
6. References............................................................................................................................12
Data Breach of 21st Century_3
3DATA BREACH OF 21ST CENTURY
Data Breach of 21st Century_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Data Breach of 21st Century
|4
|552
|69

HEARTLAND PAYMENT SECURITY SYSTEM BREACH Name Instructor
|3
|447
|174

Case Study: Violence Against Women in America's Heartland
|5
|754
|36

CSE5CRM CYBERSECURITY RISK MANAGEMENT.
|13
|3045
|1

Cyber Security Management Assignment 2022
|11
|2597
|18

Case Study: The Home Depot Data Breach
|7
|1152
|186