SlideShare a Scribd company logo
1 of 2
The Target breach case Study Assignment.
In 2013, Target was the victim of a sophisticated data breach
that resulted in the loss of consumer information. The attackers
infected Target’s Point of Sale (POS) systems and inserted
malware that captured every swipe of a Payment Card. During
the investigation of this breach, it was determined that it
originated from a third-party vendor who didn’t incorporate
effective security controls. For this week’s case study, we are
going to do a deep dive into Target’s data breach. Your paper
must cover the following topics:
1. An overview of how the Target Data breach occurred. For
this section, we are looking primarily at when the breach was
discovered, how it was discovered, what vector(s) the attackers
used, and what was infected.
2. An overview of how Target responded to the breach. For this
section, we are looking primarily at what Target did when they
were notified of the breach. How quickly did they respond, what
steps did they take to respond, and what did they do after the
breach was resolved to further reinforce their network.
a. What could be done to further secure their network. For this
section, we are primarily looking at how Target can improve the
security of their network, including vendor/external
connections, and how an IDS and/or IPS can be used to increase
the security of their network.
b. A logical network diagram that shows your proposed network
layout that can improve the security of their network, as well as
a discussion on why you proposed this network layout. This
diagram
must
cover the following:
An outside vendor connection. How does this vendor connect to
the Target network? What security precautions are in place on
the Target network?
An IT network (domain controller, name servers, and other
similar IT assets).
A POS network.
For your POS and IT networks, show whether they connect or
not. If you decide they should connect, show how the
connection is made, and what security precautions exist on
either or both sides of the connection.
Include best scholarly sources and security sources. Attached is
the Target breach case Study.

More Related Content

Similar to The Target breach case Study Assignment.In 2013, Target was the .docx

Policy DB2 WEEK 3Discussion #2 Week 3 Minimun 250 words an
 Policy DB2 WEEK  3Discussion #2 Week 3   Minimun 250 words an Policy DB2 WEEK  3Discussion #2 Week 3   Minimun 250 words an
Policy DB2 WEEK 3Discussion #2 Week 3 Minimun 250 words an
sachazerbelq9l
 
29386971 hacking
29386971 hacking29386971 hacking
29386971 hacking
joeymar143
 
Jennings it security overview 1 2
Jennings it security overview 1 2Jennings it security overview 1 2
Jennings it security overview 1 2
Donald Jennings
 
You are a network analyst on the fly-away team for the FBIs cyberse.docx
You are a network analyst on the fly-away team for the FBIs cyberse.docxYou are a network analyst on the fly-away team for the FBIs cyberse.docx
You are a network analyst on the fly-away team for the FBIs cyberse.docx
adampcarr67227
 
Include at least 250 words in your posting and at least 250 words in
Include at least 250 words in your posting and at least 250 words inInclude at least 250 words in your posting and at least 250 words in
Include at least 250 words in your posting and at least 250 words in
maribethy2y
 
Module 02 Performance Risk-based Analytics With all the advancem
Module 02 Performance Risk-based Analytics With all the advancemModule 02 Performance Risk-based Analytics With all the advancem
Module 02 Performance Risk-based Analytics With all the advancem
IlonaThornburg83
 
Essay QuestionsAnswer all questions below in a single document, pr.docx
Essay QuestionsAnswer all questions below in a single document, pr.docxEssay QuestionsAnswer all questions below in a single document, pr.docx
Essay QuestionsAnswer all questions below in a single document, pr.docx
jenkinsmandie
 
1.Identify security objectivesSecurity objectives are go
1.Identify security objectivesSecurity objectives are go1.Identify security objectivesSecurity objectives are go
1.Identify security objectivesSecurity objectives are go
kendahudson
 
Replies Required for below Posting 1 user security awarene.docx
Replies Required for below  Posting 1  user security awarene.docxReplies Required for below  Posting 1  user security awarene.docx
Replies Required for below Posting 1 user security awarene.docx
sodhi3
 

Similar to The Target breach case Study Assignment.In 2013, Target was the .docx (20)

Policy DB2 WEEK 3Discussion #2 Week 3 Minimun 250 words an
 Policy DB2 WEEK  3Discussion #2 Week 3   Minimun 250 words an Policy DB2 WEEK  3Discussion #2 Week 3   Minimun 250 words an
Policy DB2 WEEK 3Discussion #2 Week 3 Minimun 250 words an
 
Cyber Threat Intelligence.pptx
Cyber Threat Intelligence.pptxCyber Threat Intelligence.pptx
Cyber Threat Intelligence.pptx
 
29386971 hacking
29386971 hacking29386971 hacking
29386971 hacking
 
Jennings it security overview 1 2
Jennings it security overview 1 2Jennings it security overview 1 2
Jennings it security overview 1 2
 
Cybersecurity: A Manufacturers Guide by Clearnetwork
Cybersecurity: A Manufacturers Guide by ClearnetworkCybersecurity: A Manufacturers Guide by Clearnetwork
Cybersecurity: A Manufacturers Guide by Clearnetwork
 
Jennings it security overview 1 2
Jennings it security overview 1 2Jennings it security overview 1 2
Jennings it security overview 1 2
 
Puna 2015
Puna 2015Puna 2015
Puna 2015
 
Deep Learning based Threat / Intrusion detection system
Deep Learning based Threat / Intrusion detection systemDeep Learning based Threat / Intrusion detection system
Deep Learning based Threat / Intrusion detection system
 
INFORMATION SECURITY MANAGEMENT - Critique the employment of ethical hacking ...
INFORMATION SECURITY MANAGEMENT - Critique the employment of ethical hacking ...INFORMATION SECURITY MANAGEMENT - Critique the employment of ethical hacking ...
INFORMATION SECURITY MANAGEMENT - Critique the employment of ethical hacking ...
 
You are a network analyst on the fly-away team for the FBIs cyberse.docx
You are a network analyst on the fly-away team for the FBIs cyberse.docxYou are a network analyst on the fly-away team for the FBIs cyberse.docx
You are a network analyst on the fly-away team for the FBIs cyberse.docx
 
Analysis the attack and E-commerce security
Analysis the attack and E-commerce securityAnalysis the attack and E-commerce security
Analysis the attack and E-commerce security
 
Cyber and information security operations and assurance
Cyber and information security operations and assurance Cyber and information security operations and assurance
Cyber and information security operations and assurance
 
Include at least 250 words in your posting and at least 250 words in
Include at least 250 words in your posting and at least 250 words inInclude at least 250 words in your posting and at least 250 words in
Include at least 250 words in your posting and at least 250 words in
 
IRJET- Ethical Hacking
IRJET- Ethical HackingIRJET- Ethical Hacking
IRJET- Ethical Hacking
 
Cybersecurity risk assessments help organizations identify.pdf
Cybersecurity risk assessments help organizations identify.pdfCybersecurity risk assessments help organizations identify.pdf
Cybersecurity risk assessments help organizations identify.pdf
 
Module 02 Performance Risk-based Analytics With all the advancem
Module 02 Performance Risk-based Analytics With all the advancemModule 02 Performance Risk-based Analytics With all the advancem
Module 02 Performance Risk-based Analytics With all the advancem
 
Essay QuestionsAnswer all questions below in a single document, pr.docx
Essay QuestionsAnswer all questions below in a single document, pr.docxEssay QuestionsAnswer all questions below in a single document, pr.docx
Essay QuestionsAnswer all questions below in a single document, pr.docx
 
IRJET-Ethical Hacking
IRJET-Ethical HackingIRJET-Ethical Hacking
IRJET-Ethical Hacking
 
1.Identify security objectivesSecurity objectives are go
1.Identify security objectivesSecurity objectives are go1.Identify security objectivesSecurity objectives are go
1.Identify security objectivesSecurity objectives are go
 
Replies Required for below Posting 1 user security awarene.docx
Replies Required for below  Posting 1  user security awarene.docxReplies Required for below  Posting 1  user security awarene.docx
Replies Required for below Posting 1 user security awarene.docx
 

More from sarah98765

The subject Cloud Security and ComplianceEach student needs.docx
The subject Cloud Security and ComplianceEach student needs.docxThe subject Cloud Security and ComplianceEach student needs.docx
The subject Cloud Security and ComplianceEach student needs.docx
sarah98765
 
The subject of divorce has been the topic of multiple research s.docx
The subject of divorce has been the topic of multiple research s.docxThe subject of divorce has been the topic of multiple research s.docx
The subject of divorce has been the topic of multiple research s.docx
sarah98765
 
THe subject is children living in norfolk va with cancer.Research .docx
THe subject is children living in norfolk va with cancer.Research .docxTHe subject is children living in norfolk va with cancer.Research .docx
THe subject is children living in norfolk va with cancer.Research .docx
sarah98765
 
The study of the philosophy of friendship provides us with an  o.docx
The study of the philosophy of friendship provides us with an  o.docxThe study of the philosophy of friendship provides us with an  o.docx
The study of the philosophy of friendship provides us with an  o.docx
sarah98765
 
The Tea Party movement that started in 2010 is considered by some po.docx
The Tea Party movement that started in 2010 is considered by some po.docxThe Tea Party movement that started in 2010 is considered by some po.docx
The Tea Party movement that started in 2010 is considered by some po.docx
sarah98765
 
The student will•Apply critical thinking through participat.docx
The student will•Apply critical thinking through participat.docxThe student will•Apply critical thinking through participat.docx
The student will•Apply critical thinking through participat.docx
sarah98765
 
The tasks You are assumed to be one of the software consultants .docx
The tasks You are assumed to be one of the software consultants .docxThe tasks You are assumed to be one of the software consultants .docx
The tasks You are assumed to be one of the software consultants .docx
sarah98765
 
The Task Your assignment is to create a seven page multiple so.docx
The Task Your assignment is to create a seven page multiple so.docxThe Task Your assignment is to create a seven page multiple so.docx
The Task Your assignment is to create a seven page multiple so.docx
sarah98765
 
The task is to design and develop a prototype for one of the fea.docx
The task is to design and develop a prototype for one of the fea.docxThe task is to design and develop a prototype for one of the fea.docx
The task is to design and develop a prototype for one of the fea.docx
sarah98765
 

More from sarah98765 (20)

The subject of technology, particularly social media, is controversi.docx
The subject of technology, particularly social media, is controversi.docxThe subject of technology, particularly social media, is controversi.docx
The subject of technology, particularly social media, is controversi.docx
 
The subject Cloud Security and ComplianceEach student needs.docx
The subject Cloud Security and ComplianceEach student needs.docxThe subject Cloud Security and ComplianceEach student needs.docx
The subject Cloud Security and ComplianceEach student needs.docx
 
The subject of divorce has been the topic of multiple research s.docx
The subject of divorce has been the topic of multiple research s.docxThe subject of divorce has been the topic of multiple research s.docx
The subject of divorce has been the topic of multiple research s.docx
 
The subject is companies lawEssay 800-1000 wordsDue da.docx
The subject is companies lawEssay 800-1000 wordsDue da.docxThe subject is companies lawEssay 800-1000 wordsDue da.docx
The subject is companies lawEssay 800-1000 wordsDue da.docx
 
The subject is Legalization of Marijuana in AmericaWhen you .docx
The subject is Legalization of Marijuana in AmericaWhen you .docxThe subject is Legalization of Marijuana in AmericaWhen you .docx
The subject is Legalization of Marijuana in AmericaWhen you .docx
 
the subject is a kitchen remodel1.4 Work Breakdown S.docx
the subject is a kitchen remodel1.4 Work Breakdown S.docxthe subject is a kitchen remodel1.4 Work Breakdown S.docx
the subject is a kitchen remodel1.4 Work Breakdown S.docx
 
THe subject is children living in norfolk va with cancer.Research .docx
THe subject is children living in norfolk va with cancer.Research .docxTHe subject is children living in norfolk va with cancer.Research .docx
THe subject is children living in norfolk va with cancer.Research .docx
 
The subdivision that I chose is Florida Re-Entry Subdivision (aka Re.docx
The subdivision that I chose is Florida Re-Entry Subdivision (aka Re.docxThe subdivision that I chose is Florida Re-Entry Subdivision (aka Re.docx
The subdivision that I chose is Florida Re-Entry Subdivision (aka Re.docx
 
The study of the philosophy of friendship provides us with an  o.docx
The study of the philosophy of friendship provides us with an  o.docxThe study of the philosophy of friendship provides us with an  o.docx
The study of the philosophy of friendship provides us with an  o.docx
 
The Tea Party movement that started in 2010 is considered by some po.docx
The Tea Party movement that started in 2010 is considered by some po.docxThe Tea Party movement that started in 2010 is considered by some po.docx
The Tea Party movement that started in 2010 is considered by some po.docx
 
The TCP, UDP, and IP were designed to provide best-effort service wi.docx
The TCP, UDP, and IP were designed to provide best-effort service wi.docxThe TCP, UDP, and IP were designed to provide best-effort service wi.docx
The TCP, UDP, and IP were designed to provide best-effort service wi.docx
 
The student will•Apply critical thinking through participat.docx
The student will•Apply critical thinking through participat.docxThe student will•Apply critical thinking through participat.docx
The student will•Apply critical thinking through participat.docx
 
The tasks You are assumed to be one of the software consultants .docx
The tasks You are assumed to be one of the software consultants .docxThe tasks You are assumed to be one of the software consultants .docx
The tasks You are assumed to be one of the software consultants .docx
 
The Task Your assignment is to create a seven page multiple so.docx
The Task Your assignment is to create a seven page multiple so.docxThe Task Your assignment is to create a seven page multiple so.docx
The Task Your assignment is to create a seven page multiple so.docx
 
The tasks related to securing the homeland and its critical infr.docx
The tasks related to securing the homeland and its critical infr.docxThe tasks related to securing the homeland and its critical infr.docx
The tasks related to securing the homeland and its critical infr.docx
 
The task is to write up about the Impact of Technology on proj.docx
The task is to write up about the Impact of Technology on proj.docxThe task is to write up about the Impact of Technology on proj.docx
The task is to write up about the Impact of Technology on proj.docx
 
The task is to design and develop a prototype for one of the fea.docx
The task is to design and develop a prototype for one of the fea.docxThe task is to design and develop a prototype for one of the fea.docx
The task is to design and develop a prototype for one of the fea.docx
 
The task is individualThe deliverable has to be a report 2,500-.docx
The task is individualThe deliverable has to be a report 2,500-.docxThe task is individualThe deliverable has to be a report 2,500-.docx
The task is individualThe deliverable has to be a report 2,500-.docx
 
The task is attached here. Thanks a lotRubricsHighly develo.docx
The task is attached here. Thanks a lotRubricsHighly develo.docxThe task is attached here. Thanks a lotRubricsHighly develo.docx
The task is attached here. Thanks a lotRubricsHighly develo.docx
 
The task for this paper is toYou are to select a technology w.docx
The task for this paper is toYou are to select a technology w.docxThe task for this paper is toYou are to select a technology w.docx
The task for this paper is toYou are to select a technology w.docx
 

Recently uploaded

SPLICE Working Group: Reusable Code Examples
SPLICE Working Group:Reusable Code ExamplesSPLICE Working Group:Reusable Code Examples
SPLICE Working Group: Reusable Code Examples
Peter Brusilovsky
 
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
MysoreMuleSoftMeetup
 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
EADTU
 

Recently uploaded (20)

e-Sealing at EADTU by Kamakshi Rajagopal
e-Sealing at EADTU by Kamakshi Rajagopale-Sealing at EADTU by Kamakshi Rajagopal
e-Sealing at EADTU by Kamakshi Rajagopal
 
SPLICE Working Group: Reusable Code Examples
SPLICE Working Group:Reusable Code ExamplesSPLICE Working Group:Reusable Code Examples
SPLICE Working Group: Reusable Code Examples
 
Michaelis Menten Equation and Estimation Of Vmax and Tmax.pptx
Michaelis Menten Equation and Estimation Of Vmax and Tmax.pptxMichaelis Menten Equation and Estimation Of Vmax and Tmax.pptx
Michaelis Menten Equation and Estimation Of Vmax and Tmax.pptx
 
UChicago CMSC 23320 - The Best Commit Messages of 2024
UChicago CMSC 23320 - The Best Commit Messages of 2024UChicago CMSC 23320 - The Best Commit Messages of 2024
UChicago CMSC 23320 - The Best Commit Messages of 2024
 
How to Manage Website in Odoo 17 Studio App.pptx
How to Manage Website in Odoo 17 Studio App.pptxHow to Manage Website in Odoo 17 Studio App.pptx
How to Manage Website in Odoo 17 Studio App.pptx
 
Play hard learn harder: The Serious Business of Play
Play hard learn harder:  The Serious Business of PlayPlay hard learn harder:  The Serious Business of Play
Play hard learn harder: The Serious Business of Play
 
What is 3 Way Matching Process in Odoo 17.pptx
What is 3 Way Matching Process in Odoo 17.pptxWhat is 3 Way Matching Process in Odoo 17.pptx
What is 3 Way Matching Process in Odoo 17.pptx
 
VAMOS CUIDAR DO NOSSO PLANETA! .
VAMOS CUIDAR DO NOSSO PLANETA!                    .VAMOS CUIDAR DO NOSSO PLANETA!                    .
VAMOS CUIDAR DO NOSSO PLANETA! .
 
Rich Dad Poor Dad ( PDFDrive.com )--.pdf
Rich Dad Poor Dad ( PDFDrive.com )--.pdfRich Dad Poor Dad ( PDFDrive.com )--.pdf
Rich Dad Poor Dad ( PDFDrive.com )--.pdf
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17
 
How to Send Pro Forma Invoice to Your Customers in Odoo 17
How to Send Pro Forma Invoice to Your Customers in Odoo 17How to Send Pro Forma Invoice to Your Customers in Odoo 17
How to Send Pro Forma Invoice to Your Customers in Odoo 17
 
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
8 Tips for Effective Working Capital Management
8 Tips for Effective Working Capital Management8 Tips for Effective Working Capital Management
8 Tips for Effective Working Capital Management
 
Andreas Schleicher presents at the launch of What does child empowerment mean...
Andreas Schleicher presents at the launch of What does child empowerment mean...Andreas Schleicher presents at the launch of What does child empowerment mean...
Andreas Schleicher presents at the launch of What does child empowerment mean...
 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Graduate Outcomes Presentation Slides - English (v3).pptx
Graduate Outcomes Presentation Slides - English (v3).pptxGraduate Outcomes Presentation Slides - English (v3).pptx
Graduate Outcomes Presentation Slides - English (v3).pptx
 
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
 

The Target breach case Study Assignment.In 2013, Target was the .docx

  • 1. The Target breach case Study Assignment. In 2013, Target was the victim of a sophisticated data breach that resulted in the loss of consumer information. The attackers infected Target’s Point of Sale (POS) systems and inserted malware that captured every swipe of a Payment Card. During the investigation of this breach, it was determined that it originated from a third-party vendor who didn’t incorporate effective security controls. For this week’s case study, we are going to do a deep dive into Target’s data breach. Your paper must cover the following topics: 1. An overview of how the Target Data breach occurred. For this section, we are looking primarily at when the breach was discovered, how it was discovered, what vector(s) the attackers used, and what was infected. 2. An overview of how Target responded to the breach. For this section, we are looking primarily at what Target did when they were notified of the breach. How quickly did they respond, what steps did they take to respond, and what did they do after the breach was resolved to further reinforce their network. a. What could be done to further secure their network. For this section, we are primarily looking at how Target can improve the security of their network, including vendor/external connections, and how an IDS and/or IPS can be used to increase the security of their network. b. A logical network diagram that shows your proposed network layout that can improve the security of their network, as well as a discussion on why you proposed this network layout. This diagram must cover the following:
  • 2. An outside vendor connection. How does this vendor connect to the Target network? What security precautions are in place on the Target network? An IT network (domain controller, name servers, and other similar IT assets). A POS network. For your POS and IT networks, show whether they connect or not. If you decide they should connect, show how the connection is made, and what security precautions exist on either or both sides of the connection. Include best scholarly sources and security sources. Attached is the Target breach case Study.