Analysis of article of Target Ignored Data Breach

Requirement

Please read the article Target Ignored Data Breach Alarms at http://www.darkreading.com/attacks-and-breaches/target-ignored-data-breach-alarms/d/d-id/1127712 and write about the same.

Solution

Managing security at Target

Based on the benefit of hindsight, the security at Target will be managed differently in order to prevent the intrusion or quickly detect and isolate the intrusion in the following way:
The main cause of the intrusion was the ignorance of the security team at Target. So, from now, the risks related to different parts of the security system will be determined. This will help in providing a baseline for the implementation of the security plans so that the assets of the company can be protected against various threats. For every aspect and part of the risk or the threat that will be determined, a team will be deployed who will continuously monitor the working of the security plans, and if they detect anything major or minor intrusion, they will be responsible for taking and immediate action. This approach will be helpful because this will make the team accountable for their actions. So, if they will ignore the intrusion or they will not take action, then they will be held liable for the damages that the company will suffer. So, this will make them take quick action, and the intrusion can be avoided.  

Do you have no idea how to write your Information Technology assignment? Then consider contacting Allassignmenthelp.com for assistance. Our professionals have extensive experience and always deliver well-researched bioinformatics assignments. The main advantage of getting information systems homework help from our website is timely delivery. We never miss a deadline for an assignment.

Policies, procedures and technical controls that would be implemented either to prevent or mitigate the breach:

To prevent the breach, password policies will be used in which the password system will provide security and the passwords will have to keep secret all the time. The procedure for this policy will be that each team will have a leader who will set the password and the team will also not have access to it. Only the leaders will be responsible for making the team operate it without letting them know the passwords. The technical control will also be done with the password. The change of the password and the alteration in the system can be done only by the team leaders who will be allowed to change it time so that the hacking cannot take place and the centralized authority will govern the activities of the team leaders.

Place Order For A Top Grade Assignment Now

We have some amazing discount offers running for the students

Place Your Order
 

Bibliography:

  • Dark Reading. (2016). Target Ignored Data Breach Alarms. [online] Available at: http://www.darkreading.com/attacks-and-breaches/target-ignored-data-breach-alarms/d/d-id/1127712 

  • Infosecurity Magazine. (2016). Target May Have Ignored Pre-breach Intrusion Warning. [online] Available at: http://www.infosecurity-magazine.com/news/target-may-have-ignored-pre-breach-intrusion/ [Accessed 30 Oct. 2016].

Get Quality Assignment Without Paying Upfront

Hire World's #1 Assignment Help Company

Place Your Order