What strategies could you use to build a competitive market profile?
January 19, 2018
Critically analyze current European and United States industry standards or recommendations for any Information Technology (IT) area or subarea (e.g., intrusion detection, data recovery, data retention, intrusion prevention, network infrastructure, identity validation, project management, telecommunications, etc.).
January 19, 2018

Discuss case 5.1 BlackPOS Malware Steals Target’s Customer Data.

Discuss case 5.1 BlackPOS Malware Steals Target’s Customer Data.

Answer the following questions that relate to the case:

1. Was cybersecurity a priority at Target? Explain.

2. How did lax security impact Target’s sales revenue and profit performance?

3. According to experts, how was the data breach executed?

4. In addition to the data theft, what else was damaged by this incident?

5. Was this cybersecurity incident foreseeable? Was it avoidable?

6. Why might management not treat cyberthreats as a top priority?

7. Research recent news concerning this data breach. Has Target recovered from it? Explain.

8. Assuming that the CEO and CIO were forced to resign, what message does that send to senior management at U.S. companies?


"Are you looking for this answer? We can Help click Order Now"

assignment help