Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Determine the fundamental challenges that organizations face in general in regar

ID: 3761250 • Letter: D

Question


Determine the fundamental challenges that organizations face in general in regard to protecting organizational assets and information. 
Specify the red flag(s) that Target overlooked or ignored before the retail attack and give your opinion as to why Target overlooked or ignored the red flag(s).
Determine the main actions that Target took after the breach occurred and evaluate the efficiency of such actions. 
Conclude the main reasons why the attack on Target occurred.
Give your opinion as to whether or not the attack was mainly due to the poor infrastructure or the inability of management to act accordingly.
Justify your response

Explanation / Answer

Hi,

Below is the anwer to your question:

1.Determine the fundamental challenges that organizations face in general in regard to protecting organizational assets and information.

Hacking: used to describe actions taken by someone to gain unauthorized access to a computer.The process by which cyber criminals gain access to your computer.

Malware:Malware is a way to infiltrate or damage your computer.Malicious software that infects your computer, such as computer viruses, worms, Trojan horses, spyware, and adware.

SPAM is electronic junk email. Email addresses are collected from chat rooms, websites, newsgroups and by Trojans which harvest users’ address books.SPIM is spam sent via instant messaging systems such as Yahoo! Messenger, MSN Messenger and ICQ.

VIRUS: A virus is a piece of software that can replicate itself and infect a computer without the permission or knowledge of the user. A virus can only spread when it is transmitted by a user over a network or the Internet, or through removable media such as CDs or memory sticks as well.

Pharming

Pharming is a common type of online fraud.A means to point you to a malicious and illegitimate website by redirecting the legitimate URL. Even if the URL is entered correctly, it can still be redirected to a fake website.

SPYWARE:Spyware is software that is secretly installed on a computer without the user’s consent. It monitors user activity or interferes with user control over a personal computer.

ADWARE:Adware is software which automatically plays, displays, or downloads advertisements to a computer. The adware runs either after a software program has been installed on a computer or while the application is being used. It is a spyware and therefore a threat to privacy.

Most of these are introduced into the Information system of the company by either a known person(Trusted employee) or an outsider to breach the security and cause fraud with the intention of destroying the system and making big bucks out of it.

2.Specify the red flag(s) that Target overlooked or ignored before the retail attack and give your opinion as to why Target overlooked or ignored the red flag(s).

The biggest retail hack in U.S. history wasn’t particularly inventive, nor did it appear destined for success. In the days prior to Thanksgiving 2013, someone installed malware in Target’s (TGT) security and payments system designed to steal every credit card used at the company’s 1,797 U.S. stores.

3.Determine the main actions that Target took after the breach occurred and evaluate the efficiency of such actions.

Companies collect, maintain, use, and exchange vast amounts of personal data on employees, consumers and others. Unwanted release or exposure of personal information can violate privacy, lead to identity theft, and result in adverse publicity.

The steps taken by the Target after the security breach are:

1.Contain the breach. As soon as the target became aware of a data breach it took all necessary steps to limit further data loss and should investigate the incident.

2.Analyze the breach. The Target then recorded all information relevant to the breach; learn and evaluate the cause and effect of the incident; determine whether other systems are at serious risk of future breach; and consider engaging specialized consultants to capture relevant information and performed forensic analysis.

3. planning a data breach response,

4.Target set up a separate breach compromised personal data from some 70 million Target shoppers, some of whom may have been part of the originally reported 40 million.Target CEO Gregg Steinhafel responded in an email to questions from Businessweek reporters, saying the company is in the process of "an end-to-end" review of its security operations.

5.Provided a mandatory privacy and information security training on a recurring basis to all employees, school officials, contractors, and any other staff involved in data-related activities;

6.They assessed the data breach to determine the probable cause(s) and minimize the risk of future occurrence.

7.They made necessary modifications to your breach response strategy to improve the response process.

8.As they failed to respond to multiple automated warnings from the company's anti-intrusion software" that the attackers were installing malicious software and were also planning escape routes for the information they planned to steal from the retailer's network.

9.They made it mandatory to use magnetic based cards for all their customers.

4.Conclude the main reasons why the attack on Target occurred.

1.First and formemost they didn't respond to the warnings provided by their security system.

2.They were little ignorant and didn't respond on time to teh security breach and were not well prepared for the potential threats in the system.

3.They didn't have security response team in place and didn't provide magnetic cards to their customers which could have potentailly reduced the risk of this biggest security breach.

5.Give your opinion as to whether or not the attack was mainly due to the poor infrastructure or the inability of management to act accordingly.

Both to be frank are responsible fpt this breach.But it was told by the CEO that they had a response team in place and their sceurity system was issuing alarms its just that they were ignorant to catch these warnings and act accordingly.

Hope that helps...HAPPY ANSWERING!!!!!!

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote