Determine main action that target took after breach occurred

Assignment Help Management Information Sys
Reference no: EM131299740

Assignment

Protecting organizational assets and information within the company has become a top priority for many organizational leaders.

Review the article titled "Missed Alarms and 40 Million Stolen Credit Card Numbers: How Target Blew It", located here.

Write a four to six page paper in which you:

1. Determine the fundamental challenges that organizations face in general in regard to protecting organizational assets and information.

2. Specify the red flag(s) that Target overlooked or ignored before the retail attack and give your opinion as to why Target overlooked or ignored the red flag(s).

3. Determine the main actions that Target took after the breach occurred and evaluate the efficiency of such actions.

4. Conclude the main reasons why the attack on Target occurred. Give your opinion as to whether or not the attack was mainly due to the poor infrastructure or the inability of management to act accordingly. Justify your response.

5. Use at least three quality references. Note: Wikipedia and other Websites do not qualify as academic resources.

Your assignment must follow these formatting requirements:

• Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

• Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

• Outline the strategic implications of information assurance and security in an information technology environment.
• Explain how information technology systems influence organizational strategies.
• Outline the challenges and strategies of e-Business and e-Commerce technology.
• Evaluate the ethical concerns that information technologies raise in a global context.
• Use technology and information resources to research issues in information systems and technology.
• Write clearly and concisely about topics related to information systems for decision making using proper writing mechanics and technical style conventions.

Reference no: EM131299740

Questions Cloud

Calculate the best case and worst case npv figures : Suppose the projections given for price, quantity, variable costs, and fixed costs are all accurate to within ±10 percent. Calculate the best-case and worst-case NPV figures.
Provide a brief description of 3 cikrs that exist : Provide a brief description of 3 CIKRs that exist within your community. Select one CIKR and identify what private entities/stakeholders are responsible for it's protection.
Aws are three leading cloud service providers : Google cloud, Microsoft Azure and Amazon AWS are three leading cloud service providers. Review and compare each company's offerings relatives to big data services.
Describe some of the key tasks involved in estate planning : Go to a search engine and type in "Create your own will." Read though several of these Web sites and list the pros and cons of creating your own will.
Determine main action that target took after breach occurred : Conclude the main reasons why the attack on Target occurred. Determine the main actions that Target took after the breach occurred and evaluate the efficiency of such actions.
How consumers make decisions whether or not to buy product : pply the categorization model to a product category other than beverages.- How do consumers make decisions whether or not to buy the product, and how do they arrive at their final brand decision?
Define the elements of object oriented analysis : 1. How to communicate effectively, both orally and in writing. 2. Describe the phases of the SDLC. 3. Define the elements of object oriented analysis. 4. Define and describe the activities of the systems analyst.
Evaluate the positioning of each brand : Pick a category basically dominated by two main brands.- Evaluate the positioning of each brand. Who are their target markets?
Future global cyber security issues : Discuss the ethics associated with Future Global Cyber Security Issues. Specifically discuss the ethical issues associated with the implementation of global cybersecurity policy and the interconnectedness of cyber security to society as it relate..

Reviews

Write a Review

Management Information Sys Questions & Answers

  What are some advantages to incorporating erp

What are some advantages to incorporating ERP

  How big are the transistors in the nand-based flash

Read the ComputerWorld article " Micron shrinks NAND 28% in upcoming flash drives" (http://www.computerworld.com/article/2931557/data-storage-solutions/micron-shrinks-nand-28-in-upcoming-flash-drives.html) and answer the following questions: How b..

  Paper on preventing session hijacking in cloud computing

Write a paper on Preventing Session Hijacking in Cloud Computing

  Show the impact of technology on customers

Technology Impact and Added Value - Based on assigned readings, other readings, or personal experience, discuss the impact of technology on customers

  Explain the role of purchasing and supply management

Explain the role of Purchasing and Supply Management in the development of supply chain strategy for a manufacturing organization?

  Describe some of the common vulnerabilities

Describe some of the common vulnerabilities to utility companies with a virus such as Stuxnet.

  Design of a smart application to solve business need

The purpose of this assignment is to prepare a written report that will present a detail plan and design of a smart application to solve business need stated in a business case. In this assignment you are working in a group of 3-4 students but you..

  Pay-best is facing increasing competition from

Pay-Best is facing increasing competition from other physical stores as well as from other online stores that are eroding its market share. Other business pressures are also affecting it, such as increasing regulation.

  What might be some internal and external dynamics

Analyse the reasons why some information technology professionals might have a poor attitude towards project cost management. Explain the ways these negative attitud es might affect the track record for completing projects within budget. Defend your ..

  Describe how high-growth technology companies finance

Describe how high-growth technology companies finance their operations.

  Advantages and disadvantages of using standard protocols

Standard Protocols and Reference Models - Explain the advantages and disadvantages of using standard protocols

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd