Determine main action that target took after breach occurred

Assignment Help Management Information Sys
Reference no: EM131396191

Case Study

Protecting organizational assets and information within the company has become a top priority for many organizational leaders.

Review the article titled "Missed Alarms and 40 Million Stolen Credit Card Numbers: How Target Blew It", by Michael aZRiley, Benjamin Elgin, Dune Lawrence and Carol Matlack.

Write a four to six page paper in which you:

1. Determine the fundamental challenges that organizations face in general in regard to protecting organizational assets and information.

2. Specify the red flag(s) that Target overlooked or ignored before the retail attack and give your opinion as to why Target overlooked or ignored the red flag(s).

3. Determine the main actions that Target took after the breach occurred and evaluate the efficiency of such actions.

4. Conclude the main reasons why the attack on Target occurred. Give your opinion as to whether or not the attack was mainly due to the poor infrastructure or the inability of management to act accordingly. Justify your response.

5. Use at least three quality references. Note: Wikipedia and other Websites do not qualify as academic resources.

Your assignment must follow these formatting requirements:

• Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

• Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

• Outline the strategic implications of information assurance and security in an information technology environment.
• Explain how information technology systems influence organizational strategies.
• Outline the challenges and strategies of e-Business and e-Commerce technology.
• Evaluate the ethical concerns that information technologies raise in a global context.
• Use technology and information resources to research issues in information systems and technology.
• Write clearly and concisely about topics related to information systems for decision making using proper writing mechanics and technical style conventions.

Reference no: EM131396191

Questions Cloud

Kenya an attractive site for business process outsourcing : Read the attached article "The world economy calls: Will improved communications attract call centers to Africa?" from the Economist magazine. Then answer the following questions: 1. List at least three factors that make Kenya an attractive site f..
Criticize the given definitions - schooner : Criticize the following definitions in light of the eight rules for lexical definitions:- "Schooner" means sort of like a sailboat.
Receive the promotional material : A company wishes to evaluate the effectiveness of a marketing campaign. Seventy five percent of all potential professors were reached in a focused advertising program. Twenty eight percent of those contacted adopted the book while 8% of the adopti..
Criticize the given definitions - faith : Criticize the following definitions in light of the eight rules for lexical definitions:- "Faith" means reason succumbing to insecurity.
Determine main action that target took after breach occurred : Conclude the main reasons why the attack on Target occurred. Determine the main actions that Target took after the breach occurred and evaluate the efficiency of such actions.
Criticize the given definitions - gammon : Criticize the following definitions in light of the eight rules for lexical definitions:- "Gammon" means, in backgammon, a victory in which one player defeats another before he can remove any of his men from the board.
Identify specific objectives related to the promotion of edu : Identify specific objectives related to the promotion of EDUS's acquisition of the institution. In addition, identify specific objectives related to informing potential students of new capabilities and offerings resulting from the acquisition. (Pr..
Subsequent to market intervention : Suppose the market supply of a good is given by P = 10 + 0.2Q, the market demand is given by P = 60 - 0.5Q, and the market is in equilibrium. If the government imposes a price restriction of P = $20 per unit, then subsequent to this market interve..
Criticize definitions - cello is stringed musical instrument : Criticize the following definitions in light of the eight rules for lexical definitions:- A cello is a stringed musical instrument played with a bow.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Describe possible lan topologies that could used at location

IT 340- Describe possible LAN topologies that could be used at the new location. Compare the identified LAN topology possibilities based on their relativestrengths and weaknesses in regard to support practices.

  Describe the methodology to a project using the it

Select a System/Software Development Life Cycle (SDLC) model and methodology then apply this model and methodology to a project using the Information Technology (IT) specialization i.e., Intrusion prevention. Be sure to define the SDLC model and ..

  Who deals with team issues?

Analyze the impact of economic factors on the development of IT strategy decisions at the enterprise level of the organization.

  Creates a competitive advantage for the company

Imagine that a company has developed an advanced technology that allows it to reduce its data center requirements by an unprecedented amount, and creates a competitive advantage for the company in the data center market

  Guidelines to insure complianceexamine the apa and research

guidelines to insure complianceexamine the apa and research guides section of the ashford writing center. discuss at

  What is the total number of host ip addresses required

How many "subnet bits" are required? How many hosts/subnet are useable? What is the total number of HOST IP Addresses required? What is the total number of SUBNET IP Addresses required? What is the required SUBNET MASK (Show work)?

  Data management issueswhat are some of the issues inherent

data management issueswhat are some of the issues inherent in managing data? what methods may be used to identify data

  Explain physical security and its associated challenges

Describe what you believe to be the most effective attack against mobile computing devices, and choose one (1) tool that a hacker could use to carry out this attack. Support your response with related examples of the chosen tool in use.

  Information politicsone of the most critical problems faced

information politicsone of the most critical problems faced by the information technology department in virtually every

  Determine the service utilization

Simulate the process for the first twenty persons arriving for flu shots.-  Determine the average time in queue.- Determine the service utilization.

  How does resource allocation affect quality of service

Identify the appropriate performance mechanisms and architectural considerations that should be included in developing each section of the plan. How does resource allocation affect quality of service

  Advantages of data pump

Kuhn (2013) suggests that one of the advantages of data pump is that it can be used to populate materialized views using prebuilt tables loaded using data pump. This can be useful for loading large data sets in data warehouse environments

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd