logo

The Home Depot Data Breach

   

Added on  2023-04-23

8 Pages1749 Words476 Views
 | 
 | 
 | 
qwertyuiopasdfghjklzxcvbnmqw
ertyuiopasdfghjklzxcvbnmqwert
yuiopasdfghjklzxcvbnmqwertyui
opasdfghjklzxcvbnmqwertyuiop
asdfghjklzxcvbnmqwertyuiopasd
fghjklzxcvbnmqwertyuiopasdfgh
jklzxcvbnmqwertyuiopasdfghjkl
zxcvbnmqwertyuiopasdfghjklzxc
vbnmqwertyuiopasdfghjklzxcvb
nmqwertyuiopasdfghjklzxcvbnm
qwertyuiopasdfghjklzxcvbnmqw
ertyuiopasdfghjklzxcvbnmqwert
yuiopasdfghjklzxcvbnmqwertyui
opasdfghjklzxcvbnmqwertyuiop
asdfghjklzxcvbnmqwertyuiopasd
fghjklzxcvbnmqwertyuiopasdfgh
jklzxcvbnmrtyuiopasdfghjklzxcv
The Home Depot Data Breach
Case Report
The Home Depot Data Breach_1

The Home Depot Data Breach
Executive Summary
Security breaches and threats have become a common occurrence in the present times. One
such case was reported by Home Depot in September, 2014. The report is a case report that
provides a background on the case along with the key issues and findings involved. There are
alternative solutions that could have been used to prevent the attacks that are included in the
report along with the recommendations and lessons learned.
Keywords: Privacy, Security, Breach, Data, Payment, Credit Card
1
The Home Depot Data Breach_2

The Home Depot Data Breach
Table of Contents
Case Background...................................................................................................................................3
Key Issues.............................................................................................................................................3
Analysis of Alternative Solutions..........................................................................................................3
Chip-and-Pin Cards...........................................................................................................................4
Use of Mobile Payments....................................................................................................................4
Point to Point Encryption...................................................................................................................4
Findings.................................................................................................................................................4
Discussions & Recommendations.........................................................................................................5
Conclusion – Lessons Learned..............................................................................................................6
References.............................................................................................................................................7
2
The Home Depot Data Breach_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents