> A third party vendor which is an HVAC company based in Pennsylvania, was given access to Target's systems. The systems of this third party vendor became the first point of entry for attackers to gain access to …show more content…
- If Target had used Honey Pots to trap and identify different attacks and acted upon it and/or - If Target had acted upon the alerts risen by the Intrusion Detection Systems it had in place.
Has Target employed above mentioned critical countermeasures and controls it could have avoided the data breach or at least kept the damage done by the attackers to a minimum. The most unfortunate thing was that Target had some countermeasures like Intrusion Detection Systems in place to avoid such attacks/incidents, however it failed to have set of standards and principles and an organized chain of structure that could act upon the alerts which could have prevented this data