logo

Teach with Digital Technologies

   

Added on  2022-05-11

8 Pages1687 Words32 Views
qwertyuiopasdfghjklzxcvbnmqw
ertyuiopasdfghjklzxcvbnmqwert
yuiopasdfghjklzxcvbnmqwertyui
opasdfghjklzxcvbnmqwertyuiop
asdfghjklzxcvbnmqwertyuiopasd
fghjklzxcvbnmqwertyuiopasdfgh
jklzxcvbnmqwertyuiopasdfghjkl
zxcvbnmqwertyuiopasdfghjklzxc
vbnmqwertyuiopasdfghjklzxcvb
nmqwertyuiopasdfghjklzxcvbnm
qwertyuiopasdfghjklzxcvbnmqw
ertyuiopasdfghjklzxcvbnmqwert
yuiopasdfghjklzxcvbnmqwertyui
opasdfghjklzxcvbnmqwertyuiop
asdfghjklzxcvbnmqwertyuiopasd
fghjklzxcvbnmqwertyuiopasdfgh
jklzxcvbnmrtyuiopasdfghjklzxcv
The Home Depot Data Breach
Case Report
1/20/2019

The Home Depot Data Breach
Executive Summary
Security breaches and threats have become a common occurrence in the present times. One
such case was reported by Home Depot in September, 2014. The report is a case report that
provides a background on the case along with the key issues and findings involved. There are
alternative solutions that could have been used to prevent the attacks that are included in the
report along with the recommendations and lessons learned.
Keywords: Privacy, Security, Breach, Data, Payment, Credit Card
1

The Home Depot Data Breach
Table of Contents
Case Background...................................................................................................................................3
Key Issues.............................................................................................................................................3
Analysis of Alternative Solutions..........................................................................................................3
Chip-and-Pin Cards...........................................................................................................................4
Use of Mobile Payments....................................................................................................................4
Point to Point Encryption...................................................................................................................4
Findings.................................................................................................................................................4
Discussions & Recommendations.........................................................................................................5
Conclusion – Lessons Learned..............................................................................................................6
References.............................................................................................................................................7
2

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
The Home Depot Data Breach
|8
|1749
|476

IT Security Management: The Home Depot Data Breach
|14
|4702
|91

Case Study: The Home Depot Data Breach
|7
|1152
|186

Issue in POS Systems - Assignment
|3
|724
|290

DATA INTEGRITY AND DISASTER RECOVERY
|5
|982
|12

Critical Analysis on Home Depot Data Breach
|8
|1651
|61