Discuss the areas of vulnerability

Assignment Help Management Information Sys
Reference no: EM131801539 , Length: 3

• Application of Security Principles

During the Christmas holiday shopping season in 2013, Target Corporation revealed that it had been the victim of a massive data breach, which compromised the identities of millions of their customers.

While Target had the misfortune of being the first to reveal the breach, it was later discovered, in a much less public way, that other retailers had been victims of the same attack.

Engage in research on this particular data breach and learn as much as you can about the circumstances, sources, and methods that were used in this attack.

When you have completed that research and the study activities related to security principles, apply those principles to what you have learned about the attack.

Write a 2"3 page paper discussing the areas of vulnerability that were exploited and what security principles failed, providing a gateway into the information assets of Target Corporation and other retailers. As part of your discussion:

• Analyze the approach taken by the attackers to gain access to this data.

• Analyze the failures in the security principles that made the organization vulnerable to this attack.

• Explain how this attack could have been prevented without impacting user productivity or customer satisfaction.

• Explain how the security principles can be applied in order to enforce policy and prevent a future breach.

Assignment Requirements

• Written communication: Written communication is free of errors that detract from the overall message.

• APA formatting: Resources and citations are formatted according to APA (6th edition) style and formatting.

• Length of paper: 2-3 pages, excluding the references page.

• Font and font size: Times New Roman, 12 point.

• Required Reading

The required reading is foundational to the concepts of security principles, which will support the Unit 1 assignment.

• Use Information Security Management Handbook to read the following:

o Chapter 3, "Appreciating Organizational Behavior and Institutions to Solidify Your Information Security Program," pages 29-46.

o Chapter 4, "The Information Security Auditors Have Arrived-Now What?," pages 47-62.

• Use Systems Security Engineering: An Integrated Approach to Building Trustworthy Resilient Systems to read Chapter 2, "The Fundamentals," pages 5-32.

• Web Resources

Video

The objective of this video is to demonstrate some practical application of the information security principles that were covered in the required reading.

• Security Principles Versus the Real World (54 minutes).

Internet and Library Research

Use the following keywords to research the history of the information security profession in preparation for participating in the unit discussion:

• History of information security.

• Information security evolution.

• Computer security history.

• Computer security founders.

• Information security founders.

Reference no: EM131801539

Questions Cloud

Create a balance sheet for events and transactions : Create a balance sheet for the following items, Events and transactions
What will be george and marthas child tax credit : George and Martha are married and file a joint return claiming their two children, ages 10 and 8. What will be George and Martha's 2016 child tax credit?
Find the linear regression equation for hourly earnings : Find the linear regression equation for hourly earnings as a function of time (with x = 0 representing 1970).
Implement teams throughout your division on trial basis : Your organization?s president has read a lot about teams in the popular press and wants to implement teams throughout your division on a trial basis.
Discuss the areas of vulnerability : Write a 2-3 page paper discussing the areas of vulnerability that were exploited and what security principles failed.
How can the irs manage tax prepares better : How can the IRS manage tax prepares better. There are many software programs out there now and many tax services that "pop-up" during tax season
Effects on productivity of an increased capital investment : Interpret the graphs in parts (b) and (d) with regard to what they say about the effects on productivity of an increased capital investment (part b).
Outline how the new lower materiality level will affect : Outline how the new lower materiality level will affect the nature and extent of audit procedures planned.
What are the major barriers to their advancement : Why is the glass ceiling metaphor inadequate for explaining women?s lack of progress in reaching the C-suite? What are the major barriers to their advancement?

Reviews

Write a Review

Management Information Sys Questions & Answers

  Information technology and the changing fabric

Illustrations of concepts from organizational structure, organizational power and politics and organizational culture.

  Case study: software-as-a-service goes mainstream

Explain the questions based on case study. case study - salesforce.com: software-as-a-service goes mainstream

  Research proposal on cloud computing

The usage and influence of outsourcing and cloud computing on Management Information Systems is the proposed topic of the research project.

  Host an e-commerce site for a small start-up company

This paper will help develop internet skills in commercial services for hosting an e-commerce site for a small start-up company.

  How are internet technologies affecting the structure

How are Internet technologies affecting the structure and work roles of modern organizations?

  Segregation of duties in the personal computing environment

Why is inadequate segregation of duties a problem in the personal computing environment?

  Social media strategy implementation and evaluation

Social media strategy implementation and evaluation

  Problems in the personal computing environment

What is the basic purpose behind segregation of duties a problem in the personal computing environment?

  Role of it/is in an organisation

Prepare a presentation on Information Systems and Organizational changes

  Perky pies

Information systems to adequately manage supply both up and down stream.

  Mark the equilibrium price and quantity

The demand schedule for computer chips.

  Visit and analyze the company-specific web-site

Visit and analyze the Company-specific web-site with respect to E-Commerce issues

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd