Discussion Post: Security Breaches
Students will assess actual security breaches and think critically about the cause, impact, continuity, and prevention of these malicious attacks.
In Target's 2013 holiday data breach and cyber-attack, data belonging to millions of customers was disclosed. The hackers in the Target attack used legitimate credentials to initially enter the system. In 500 words or more, address social engineering and the most likely way the attackers used valid credentials to achieve their hack, and how the rather significant planning failed to protect the company. What elements of a detailed strategic operational plan were missed by Target?
The response must include a reference list. Using one-inch margins, double-space, Times New Roman 12 pnt font and APA style of writing and citations.