Preview

Target Data Breach Case Study

Good Essays
Open Document
Open Document
690 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Target Data Breach Case Study
The Target data breach is a very good example of the risks of using single level/layer defense strategies for information security in an organization. In fact, it taught us and the organizations in the information security industry a very valuable lesson as to how important is it to employ strategies like Defense in Depth, Critical Controls etc., Below is a brief summary of steps that can be taken to avoid such attacks. I've included the chain of different events that led to the Target Data breach and the Countermeasures/controls that could be put in place to counter and/or avoid such events/attacks.

> A third party vendor which is an HVAC company based in Pennsylvania, was given access to Target's systems. The systems of this third party vendor became the first point of entry for attackers to gain access to
…show more content…
- If Target had used Honey Pots to trap and identify different attacks and acted upon it and/or - If Target had acted upon the alerts risen by the Intrusion Detection Systems it had in place.

Has Target employed above mentioned critical countermeasures and controls it could have avoided the data breach or at least kept the damage done by the attackers to a minimum. The most unfortunate thing was that Target had some countermeasures like Intrusion Detection Systems in place to avoid such attacks/incidents, however it failed to have set of standards and principles and an organized chain of structure that could act upon the alerts which could have prevented this data

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Unit 454 Lab 4 Essay

    • 457 Words
    • 2 Pages

    Honey pot is a closely monitored decoy system. It traces the network attacks. It can distract from more valuable targets and gather forensic evidence from the attackers and their techniques.…

    • 457 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    IS4799

    • 675 Words
    • 8 Pages

     Lateral information • Information gathered from other bidders  Procurement • Process of acquiring (purchasing)  Contracts • Legal agreements between provider and client IS4799 Information Systems and Cybersecurity Capstone Project © ITT Educational Services, Inc. All rights reserved.…

    • 675 Words
    • 8 Pages
    Satisfactory Essays
  • Good Essays

    ISSC362 Week 2 Lab

    • 454 Words
    • 2 Pages

    6. Which tool and application were used to exploit the identified vulnerability on the targeted Microsoft® Windows…

    • 454 Words
    • 2 Pages
    Good Essays
  • Good Essays

    FXT2 Task2

    • 825 Words
    • 4 Pages

    This incident could’ve been contained by implementing a multiauthentication system and data encryption. Permissions need to be set although because the attack was done accessing human resource files, that would not have been a direct help. The human resource department would have access to payroll and financial records. Email digital signatures would also have helped so the emails to the auditor would not have been able to be spoofed.…

    • 825 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    It 244 Appendix B

    • 3468 Words
    • 14 Pages

    Awareness of these kinds of attacks is the key and to be prepared on the part of management and the user. They must be made aware of the consequences of their actions while using the network and accessing the data. The users of the network and system need to be prepared in case of an attack and have knowledge of…

    • 3468 Words
    • 14 Pages
    Powerful Essays
  • Good Essays

    As I read an article written by Mr. Mathew J. Schwartz, dated March 12. 2012, for InformationWeek via darkreading.com, and ponder the strength of the subject matter discussed, I asked myself the question when does attack prevention begin? The question does present an abstract yet requires that careful thought be exercised when approaching information security breaches, and how to prevent attacks; a technological melancholy with very expensive associations.…

    • 639 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Ethics Case Analysis

    • 1127 Words
    • 4 Pages

    A Denial of Service (DoS) attack on the corporate IT system at IVK Corporation. (Adapted from the book The Adventures of an IT Leader, 2009, Harvard Business School Publishing). After reading the case description, answer the questions that follow.…

    • 1127 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    Unit 1 Assignment 2

    • 313 Words
    • 2 Pages

    By understanding what controls and strategies are already in place for this company to protect this data, the company can now move forward and decide on a desired result, develop a workable plan and monitor its process. I feel the key to this company’s problem with breach of sensitive online data is fire wall and encryption.…

    • 313 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    6) Your company’s computers have been taken over by an attacker and used to attack another organization’s information systems. Your problem is which of the following?…

    • 946 Words
    • 4 Pages
    Good Essays
  • Better Essays

    [Company] has been contracted to conduct a penetration test against [Organization] external web presence. The…

    • 1355 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Scenario Three

    • 791 Words
    • 4 Pages

    There are steps that the IT department could have taken to avoid the situation that occurred. There should have been policies in place to ensure that antivirus/malware software was installed on the computer before it was allowed to connect to any network. A machine build checklist could be implemented to where after a computer is initially setup with appropriate operating software, all relevant applications needed would then be installed, including the antivirus software. The endpoint protection software could be installed in a standalone mode if the system being deployed was not going to be part of the larger domain network or if it was going to be used for short term testing. Otherwise it could be deployed from a central management server. It would at the very minimum have that protection on it. Most antivirus vendors have auto update features in their software so that in the event the virus definitions become outdated the software automatically checks in to download the latest definitions.…

    • 791 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    mis 535

    • 2196 Words
    • 8 Pages

    Major corporations, governments, and other organizations are hacked each week, mostly by means of phishing attacks. Describe how users and IT organizations should arm themselves against these attacks.…

    • 2196 Words
    • 8 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Anthem Syndrome

    • 340 Words
    • 2 Pages

    In 2015, Anthem has announced their biggest data breach yet, 80 million people were at risk in having their personal data exposed which may cause identity fraud. This was not the case in just losing a credit card it was much more personal because of the information it contained. Everyone’s social security numbers, previous health records, previous employees and previous address that is the biggest issue in this case. This was called “sophisticated attack” because someone has impersonated as administrator worker. This allows the thieves to go back in later and enter much sensitive information that is not for the public eye.…

    • 340 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    IS4560 Lab 1 Assessment

    • 292 Words
    • 1 Page

    2. Reconnaissance would be the only legal way to obtain information about a target, footprinting would be rolled into this step.…

    • 292 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Cell Phone Impact

    • 978 Words
    • 4 Pages

    from attacks like nine eleven by “strengthening” security controls such as monitoring emails and social media.…

    • 978 Words
    • 4 Pages
    Good Essays