logo

Information Security Case Study

   

Added on  2023-04-10

9 Pages1388 Words70 Views
Running head: INFORMATION SECURITY CASE STUDY
Information Security Case Study
Name of the Student
Name of the University
Author Note:

1INFORMATION SECURITY CASE STUDY
Table of Contents
1. Introduction..................................................................................................................................2
2.1 Describe the target breach.....................................................................................................2
2.2 Identify the threats target using concept map diagram..........................................................2
2.3 CIA........................................................................................................................................2
2.4 Relation to the security breach..............................................................................................3
2.5 Protections were in place.......................................................................................................3
3. Conclusion...................................................................................................................................4
4. Reference.....................................................................................................................................6

2INFORMATION SECURITY CASE STUDY
1. Introduction
The foremost determination of this paper is to focus on the threat associated which
occurred in Target Corporation’s Network in the year 2013. The advantages, disadvantages,
threats and vulnerabilities in various IT environments. A concept map diagram will be presented
in this paper considering its security threat. The CIA triad will be discussed in this paper and
how it is related to the security breach will be also presented in this paperi. The mitigation plan
for the risks will be stated in the paper considering their effectivenessii. The legal and the ethical
issue associated with this security breach will be also discussed in a detailed manner in this
paper.
2.1 Describe the target breach
This security breach is one of the most devastating among all the major data breaches of
recent times. The cyber criminals used a malware called BlackPOS and about 40 million credit
and debit card holders lost their data in this attack. The attack also compromised the data of 70
million people. The name of the consumer of the organization, their credit and debit card
numbers, expiration dates of the cards, CVV were all compromised due to the attack. Huge
amount of money was compromised due to this attackiii. There were a lot of expenses after this
security attack, which is huge concern for this organization.

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Target Data Breach: Threats, Protections, and Legal/Ethical Issues
|8
|1725
|99

Security Issues in Information Technology (pdf)
|12
|2988
|346

Cybersecurity Threat Name of the Student
|11
|2321
|49

Cyber Attack at Adobe
|11
|2363
|455

Case Study: The Home Depot Data Breach
|7
|1152
|186

Information Security System in an Educational Institution
|19
|4773
|16