Security Issues in Information Technology (pdf)

Added on - 22 Nov 2020

  • 12

    Pages

  • 2988

    Words

  • 11

    Views

  • 0

    Downloads

Trusted by +2 million users,
1000+ happy students everyday
Showing pages 1 to 4 of 12 pages
REPORT ON INFORMATIONSECURITY ISSUES
TABLE OF CONTENTSEXECUTIVE SUMMARY..................................................................................................................1INTRODUCTION................................................................................................................................2MAIN BODY.......................................................................................................................................2An outline of the process followed to devise the case study analysis.........................................2Discussion on the lessons learnt by Target from the breach.......................................................3CIA triad principles.....................................................................................................................4Personal Identifiable Information (PII) for Organization...........................................................4Threats and Vulnerabilities to the information of Organisation.................................................5Protection at place and failures occurred to organisation...........................................................6Organisation after the data breach...............................................................................................7Data breach such an important case to organization...................................................................7CONCLUSION....................................................................................................................................8REFERENCES.....................................................................................................................................9
EXECUTIVE SUMMARYIn this report it is described about Target company is invested high amount in informationsecurity of company instead of this in 2013 company faced data breaches. Also, it has beendescribed that many employees of target company including higher authorities lost their job dueto data breaches. In this CAI principles and PII is also described for data protection. Moreover, itis discussed about many strategies applied by Target for preventing breaches of confidential datasuch as Defense in Depth and Critical control.1
INTRODUCTIONThe objective of information security is to ensure sensitive information only to authorizedparties and prevent data access from unauthorized parties and any modifications done by them.The security group of company is responsible for conducting risk management through whichthreats and vulnerabilities to data assets are constantly assessed and suitable protective controlsare applied for security (Ross, McEvilley and Oren, 2018). Threats can occur in different formssuch as malware attacks, identify theft and ransomware. In order to detect threats and mitigatevulnerabilities, multiple layer security control is used by individuals which can be termed asDefence in Depth strategy. Due to occurrence of breaches the target faces many problems legallywhich damage the reputation of company. Report will include, PII for identification and CIAtriad principle. Also, the assignment will consist the threats and vulnerabilities of organisation.MAIN BODYAn outline of the process followed to devise the case study analysisIn analysing the case study there are several methods that was followed. It is described asbelow-Evaluation of the case study-Research has concluded that there are different ways tobreach the data which has occurred in organization. Study has revealed that many bigindustries has suffered various problems which may include issues like hacking thecustomer person information like credit card number, address and confidential code (Gao,Rau and Zhang, 2018). For example- the organisation has announced there were 50million consumer affected by data breach. There are different methodologies which areused in securing information of the organisation. It may include methods like black box,dynamic and static.Analysis of the key issues faced by company-Research shows that the huge enterprisesare surrounded by problem of information breach. This has laid a negative impact on thegrowth of company.Rupture of data candamage the entire business process. Breach ofinformation can lead to disclosure of important information of customers andorganizations. For example- In September 2016, the big data breach attack in the2
desklib-logo
You’re reading a preview
Preview Documents

To View Complete Document

Click the button to download
Subscribe to our plans

Download This Document