Preview

Target Data Breach Case Study

Good Essays
Open Document
Open Document
690 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Target Data Breach Case Study
The Target data breach is a very good example of the risks of using single level/layer defense strategies for information security in an organization. In fact, it taught us and the organizations in the information security industry a very valuable lesson as to how important is it to employ strategies like Defense in Depth, Critical Controls etc., Below is a brief summary of steps that can be taken to avoid such attacks. I've included the chain of different events that led to the Target Data breach and the Countermeasures/controls that could be put in place to counter and/or avoid such events/attacks.

> A third party vendor which is an HVAC company based in Pennsylvania, was given access to Target's systems. The systems of this third party vendor became the first point of entry for attackers to gain access to
…show more content…
- If Target had used Honey Pots to trap and identify different attacks and acted upon it and/or - If Target had acted upon the alerts risen by the Intrusion Detection Systems it had in place.

Has Target employed above mentioned critical countermeasures and controls it could have avoided the data breach or at least kept the damage done by the attackers to a minimum. The most unfortunate thing was that Target had some countermeasures like Intrusion Detection Systems in place to avoid such attacks/incidents, however it failed to have set of standards and principles and an organized chain of structure that could act upon the alerts which could have prevented this data

You May Also Find These Documents Helpful

  • Good Essays

    Lab8 1 Some Common Risks

    • 505 Words
    • 3 Pages

    Lab-8 1. Some common risks, threats, and vulnerabilities commonly found in the Remote Access Domain that must be mitigated through a layered security strategy are:…

    • 505 Words
    • 3 Pages
    Good Essays
  • Good Essays

    CMGT/541 April , 2009 Professor J. Mc Nickle As I read an article written by Mr. Mathew J. Schwartz, dated March 12. 2012, for InformationWeek via darkreading.com, and ponder the strength of the subject matter discussed, I asked myself the question when does attack prevention begin? The question does present an abstract yet requires that careful thought be exercised when approaching information security breaches, and how to prevent attacks; a technological melancholy with very expensive associations.…

    • 639 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Unit 1 Assignment 2

    • 313 Words
    • 2 Pages

    By understanding what controls and strategies are already in place for this company to protect this data, the company can now move forward and decide on a desired result, develop a workable plan and monitor its process. I feel the key to this company’s problem with breach of sensitive online data is fire wall and encryption.…

    • 313 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    It 244 Appendix B

    • 3468 Words
    • 14 Pages

    Awareness of these kinds of attacks is the key and to be prepared on the part of management and the user. They must be made aware of the consequences of their actions while using the network and accessing the data. The users of the network and system need to be prepared in case of an attack and have knowledge of…

    • 3468 Words
    • 14 Pages
    Powerful Essays
  • Good Essays

    Cell Phone Impact

    • 978 Words
    • 4 Pages

    from attacks like nine eleven by “strengthening” security controls such as monitoring emails and social media.…

    • 978 Words
    • 4 Pages
    Good Essays
  • Good Essays

    FXT2 Task2

    • 825 Words
    • 4 Pages

    High 3. Outline how the incident could be contained. This incident could’ve been contained by implementing a multiauthentication system and data encryption. Permissions need to be set although because the attack was done accessing human resource files, that would not have been a direct help. The human resource department would have access to payroll and financial records. Email digital signatures would also have helped so the emails to the auditor would not have been able to be spoofed.…

    • 825 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    IS4560 Lab 1 Assessment

    • 292 Words
    • 1 Page

    1. Reconnaissance, scanning, gaining access, maintaining access, and covering tracks. 2. Reconnaissance would be the only legal way to obtain information about a target, footprinting would be rolled into this step.…

    • 292 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    ISSC362 Week 2 Lab

    • 454 Words
    • 2 Pages

    6. Which tool and application were used to exploit the identified vulnerability on the targeted Microsoft® Windows…

    • 454 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Phase 2 - Scanning Once the attacker has enough information to understand how the business works and what information of value might be available, he or she begins the process of scanning perimeter and internal network devices looking for weaknesses, including…

    • 377 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Scenario Three

    • 791 Words
    • 4 Pages

    There are steps that the IT department could have taken to avoid the situation that occurred. There should have been policies in place to ensure that antivirus/malware software was installed on the computer before it was allowed to connect to any network. A machine build checklist could be implemented to where after a computer is initially setup with appropriate operating software, all relevant applications needed would then be installed, including the antivirus software. The endpoint protection software could be installed in a standalone mode if the system being deployed was not going to be part of the larger domain network or if it was going to be used for short term testing. Otherwise it could be deployed from a central management server. It would at the very minimum have that protection on it. Most antivirus vendors have auto update features in their software so that in the event the virus definitions become outdated the software automatically checks in to download the latest definitions.…

    • 791 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    References: Horton, T. (2014, May 1). The Right Technology Fix Can Help Prevent Breaches. Retrieved December 19, 2014, from ProQuest: http://search.proquest.com/docview/1548709638?accountid=458…

    • 499 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Target Data Breach

    • 1162 Words
    • 5 Pages

    Mlot, S. (2014, February 2). Hvac vendor confirms link to target data breach. Retrieved from http://www.pcmag.com/article2/0,2817,2430505,00.asp…

    • 1162 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    A. Privacy B. Accuracy C. Property D. Accessibility Answer: A 6) Your company’s computers have been taken over by an attacker and used to attack another organization’s information systems. Your problem is which of the following?…

    • 295 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Vijayan, J. (2014, February 6). Target breach happened because of a basic network segmentation error. Retrieved July 14, 2015.…

    • 256 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Honeypots

    • 702 Words
    • 3 Pages

    4/21/2013 Telecooperation Group | CASED Introduction  Definition: “A security resource who's value lies in being probed, attacked or compromised”  Doesn’t have to be a system: Honeytokens  We want to get compromised!  Certainly not a standalone security mechanism.  Why? • FUN! • No false-positives! • Research: Malware analysis/reverse engineering • Reducing available attack surface/early warning system…

    • 702 Words
    • 3 Pages
    Satisfactory Essays