Determine main action that target took after breach occurred

Assignment Help Management Information Sys
Reference no: EM131299740

Assignment

Protecting organizational assets and information within the company has become a top priority for many organizational leaders.

Review the article titled "Missed Alarms and 40 Million Stolen Credit Card Numbers: How Target Blew It", located here.

Write a four to six page paper in which you:

1. Determine the fundamental challenges that organizations face in general in regard to protecting organizational assets and information.

2. Specify the red flag(s) that Target overlooked or ignored before the retail attack and give your opinion as to why Target overlooked or ignored the red flag(s).

3. Determine the main actions that Target took after the breach occurred and evaluate the efficiency of such actions.

4. Conclude the main reasons why the attack on Target occurred. Give your opinion as to whether or not the attack was mainly due to the poor infrastructure or the inability of management to act accordingly. Justify your response.

5. Use at least three quality references. Note: Wikipedia and other Websites do not qualify as academic resources.

Your assignment must follow these formatting requirements:

• Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

• Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

• Outline the strategic implications of information assurance and security in an information technology environment.
• Explain how information technology systems influence organizational strategies.
• Outline the challenges and strategies of e-Business and e-Commerce technology.
• Evaluate the ethical concerns that information technologies raise in a global context.
• Use technology and information resources to research issues in information systems and technology.
• Write clearly and concisely about topics related to information systems for decision making using proper writing mechanics and technical style conventions.

Reference no: EM131299740

Questions Cloud

Calculate the best case and worst case npv figures : Suppose the projections given for price, quantity, variable costs, and fixed costs are all accurate to within ±10 percent. Calculate the best-case and worst-case NPV figures.
Provide a brief description of 3 cikrs that exist : Provide a brief description of 3 CIKRs that exist within your community. Select one CIKR and identify what private entities/stakeholders are responsible for it's protection.
Aws are three leading cloud service providers : Google cloud, Microsoft Azure and Amazon AWS are three leading cloud service providers. Review and compare each company's offerings relatives to big data services.
Describe some of the key tasks involved in estate planning : Go to a search engine and type in "Create your own will." Read though several of these Web sites and list the pros and cons of creating your own will.
Determine main action that target took after breach occurred : Conclude the main reasons why the attack on Target occurred. Determine the main actions that Target took after the breach occurred and evaluate the efficiency of such actions.
How consumers make decisions whether or not to buy product : pply the categorization model to a product category other than beverages.- How do consumers make decisions whether or not to buy the product, and how do they arrive at their final brand decision?
Define the elements of object oriented analysis : 1. How to communicate effectively, both orally and in writing. 2. Describe the phases of the SDLC. 3. Define the elements of object oriented analysis. 4. Define and describe the activities of the systems analyst.
Evaluate the positioning of each brand : Pick a category basically dominated by two main brands.- Evaluate the positioning of each brand. Who are their target markets?
Future global cyber security issues : Discuss the ethics associated with Future Global Cyber Security Issues. Specifically discuss the ethical issues associated with the implementation of global cybersecurity policy and the interconnectedness of cyber security to society as it relate..

Reviews

Write a Review

Management Information Sys Questions & Answers

  How security management can be applied at the company

Your CEO has asked you to prepare a report to explain whether or not a security plan is needed, and to clarify how security management can be applied at the company

  Describe at least two data transmission technologies

Research Point-to-Point (dedicated), Packet Switched, and Circuit Switched WAN protocols/circuits/types. Define each protocol and describe at least two data transmission technologies associated with the protocol. Include the bandwidth limitatio..

  What is the average number of people in line

What is the average wait in line? - What is the average number of people in line? - what are the average wait time and the average number of people in the queue?

  Why have personal navigation devices become popular

Why have Personal Navigation Devices become popular? What technologies are required to facilitate the success of PNDs

  Who was involved in the decision making

Describe an effort that you organization has undertaken to invest in technology. How was the decision made and Who was involved in the decision making

  Describe the acceptance of technology by all divisions

Describe what you think are some of the technology positives and negatives at USA Today and How would you describe the acceptance of technology by all divisions?

  Information technology in business managemente-business has

information technology in business managemente-business has birthed new paradigms of operations. it has changed

  Discuss how the expertise of the practitioners and research

Discuss how the expertise of the practitioners and researchers

  Evaluate the training you can provide to your staff

In fact, it serves as a model for other institutions in the area; however, printouts discarded in the restricted-access information systems department are not shredded. On numerous occasions, personnel working late have observed the cleaning staff..

  List the types of investments that may be at risk

Explain the importance of having accurate data for performing earned value management, based on the articles provided. Provide examples on how accurate and consistent data is related to risk management and decision making within project management..

  Define it priorities and governance for it

Identify how IT supports business processes. The business is relying on their capabilities to achieve the business goals. The IT strategy should include a plan for supporting those business capabilities, creating efficiencies, and competitive adva..

  Compare holism (systems thinking) versus reductionism

This research paper will compare and contrast Holism (Systems Thinking) versus Reductionism. The research paper must be submitted using Safe Assign.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd