Preview

Target's Attack Model

Good Essays
Open Document
Open Document
607 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Target's Attack Model
1. Does Target story follow the general “APT kill chain” attack model? Target’s story follows the general advanced persistent threat attack model. The hackers did the reconnaissance work by finding out Target’s external vendors. Unfortunately, this was easy for the hackers, because Target’s supplier portal and facilities management pages were publicly available information. So, the hackers target Fazio, an external vendor Target used. The hackers then created a targeted “weapon,,” in this case, malware, and sent phishing emails to people at Fazio. Fazio unfortunately did not use from anti-malware software. The hackers gained access to all of Fazio’s usernames and passwords, which allowed access to Target’s systems. The hackers exploited a …show more content…
At this point, data was stored on the network for days before being transmitted. Apparently, the system to automatically delete malware as they are detected was turned off. This was obviously a major lapse on the part of Target’s security team. While not directly dealing with Target’s security operations, the final breakdown occurred with Target’s poor handling of dealing with the breach. It took time for Target to go public about the breach, but did not provide much information. The website was difficult to navigate and again, the lack of information made it difficult for customers to deal with the aftermath of their information being stolen. 3. What recommendations would you give to the company in order to improve their security operations?To improve Target’s security operations, I would recommend the following:1) It was evident that Target did not know how to handle such a breach. Thus, the first step to improve Target’s security operations is to understand that they can absolutely be targets of such cyberattacks. By properly understanding this, this will lead to better decision making that will protect them from such attacks. 2) Target needs to properly segment its network and apply proper securities for each. Network checks and maintenance should be done regularly. However, this is not enough; the results should be evaluated and lead to action. 3) Ultimately, what is needed is better management and communication. It was unclear who was responsible for the breach. There needs to be clearly defined roles and response options. Target’s security operations need to outline key decisions that need to be made regarding cybersecurity and then define the roles of each person or team involved in making those decisions. Accountability measures must then be

You May Also Find These Documents Helpful

  • Good Essays

    On April 19, 1775 there was a battle that stumped people of what really happened that day for years. There are many explanations and theories of what happed but I have my own perspective of what really happened that dreadful day, of April 19, 1775. What I feel happened on that day was that when the three groups followed pretty much the same path until they came to the British patrol stopped and captured the revere and dawes group retreated back to Lexington where Prescott and the British continued there route where Edward Gould’s Affidavit group had fired first after the provincials had retreated back to the Concord, where then after they returned with up to three to four hundred people is when Edward Gould’s Affidavits group had drew up on the Concord side of the bridge, in which they were the first to fire, killing some of the men. My theory came from the testimonies of Edward Gould’s Affidavits, John Parker Affidavits, and Simon Affidavits. I also got my theory from the maps showing the routes taken.…

    • 557 Words
    • 3 Pages
    Good Essays
  • Better Essays

    A chief security endorsement position in all affiliations passes on a tremendous arrangement of responsibility and certainty. Laborers are at risk to security confirmations, foundation checks, and a succession of tests and appraisals. A staff that has chief security consent is cognizant to the most sensitive data of the affiliation including restrictive data, private data about supporters and customers, authoritative mysteries. The job strategies and specialists practices of a combination is that representative's upper security director has set rules for end, dismissal, and passive consent, of such workforce. Incidentally a specialist who leaves an aggregation on less alluring terms and the association's organization wind up in a position whereby they must confine the dangers of vengeance due to a baffled laborer. At the point when confronted with this sort of circumstance the Security managers must lead the pack and get prepared for the probability of the associations shortcomings getting to be bargained and the peril for dangers and infringement of the framework are at a top level. In a current occasion a top security approval worker of the Group Activity Organization was laid off for continually breaking arrangement principles and noncompliance. The Group Activity Org is exposed to a risk by this worker and the organization's Head of Security Officer has regarded the peril to be a high danger. After an evaluation of the office's shortcomings to the danger, the security officer made the focuses at risk are the client database, the security checking framework, the system, and laborers records.…

    • 1599 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Joyce Kozloff is a topographical artist who uses maps in her multimedia pieces. She uses maps as her main theme as to her they are the manifestation of human ideologies and the political and geographical phenomena that they cause. By mixing this with pop culture and visual appeal she creates a statement on how we hold misinformed ideas of the world and it’s fabricated borders. Her interest in maps goes further as she investigated how maps show the relationship between people and places but can be used to enforce unjust order and create isolation, tribalism and misuse by the military. This is especially apparent in “Targets” a nine foot concave hemisphere. Inside the viewer is surrounded by maps of the countries bombed by the USA with her child’s…

    • 192 Words
    • 1 Page
    Good Essays
  • Good Essays

    The unfortunate thing is the way the attackers infiltrated the POS networks and how the attackers were able to steal the payment card data, were the same methods used in the Target data breach. The attackers were able to gain access to one of Home Depot’s vendor environments by using a third-party vendor’s logon credentials. Then they exploited a zero-day vulnerability in Windows, which allowed them to pivot from the vendor-specific environment to the Home Depot corporate environment.…

    • 598 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    The article also identified the threat as a Pony Botnet Controller that captured and compromised over two million accounts. The possibilities of these types of threats are very real as experienced by many websites during this incident. One of the best ways to try and combat these type threats is to keep your patches and antivirus up to date, which was also mentioned in this article. According to a CNN Money article on this incident, the below website accounts were compromised during this event (Pagliery J, 2013).…

    • 605 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Target Strategic Audit

    • 15483 Words
    • 83 Pages

    This report examines Target Corporation’s performance in a detailed strategic audit. The audit includes an external, internal and strategic analysis as well as a recommended course of action. The findings of the audit recommend a robust on-line/mobile presence to complement in-store sales, and to increase future earnings to remain competitive by building upon physical assets, brand value and logistical capabilities.…

    • 15483 Words
    • 83 Pages
    Powerful Essays
  • Better Essays

    SWOT Analysis: Target

    • 1530 Words
    • 7 Pages

    Target’s purpose and mission statement is “We fulfill the needs and fuel the potential of our guests. That means making Target your preferred shopping destination in all channels by delivering outstanding value, continuous innovation and exceptional experiences—consistently fulfilling our Expect More. Pay Less.® brand promise.” Target’s determination to fulfill the needs and fuel the potential of their guests is leading them to their solutions that drive both business and social value. Target is focused on new ways to build onto Target’s legacy of corporate responsibility. Target works along side and together with their team members, guests, suppliers, and communities to create better outcomes on issues that matter. The focus will always be…

    • 1530 Words
    • 7 Pages
    Better Essays
  • Powerful Essays

    Target Swot Analysis

    • 976 Words
    • 4 Pages

    I 've scanned a listing of newspaper articles with "Target Corporation" as the headline, and a pattern has emerged: Target has consistently grown while many other companies are losing ground. To take just three examples: in August 2002, Target sales grew 7.5% ("Target Corporation August Sales Up 7.5 Percent," PG); In October 2002, they were up 9.8% ("Target Corporation October Sales Up 9.8 Percent," PG); and the most recent article cites a 7.7 percent increase in January 2003. ("Target Corporation January Sales Up 7.7 Percent," PG). This is an impressive record for a company in a country mired in a deepening recession.…

    • 976 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    In April 2011, hackers obtained person information from over 100 million PlayStation Network users and Sony Online Entertainment users including credit, debit, and bank account information. This breach cost Sony and credit card issuers up to a total of $2 billion dollars (Laudon, 2013). During the time of the breach, security and control were not top priority. According to this case study Sony was using an older version of Apache Web Server software that was known for its security issues and compromised the security of Sony’s firewall, allowing hacker easy access. As for control, Sony obviously did not have appropriate policies or organizational procedures…

    • 328 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Chembright’s Case

    • 819 Words
    • 3 Pages

    Likewise if Chembright does do anything about this issue, eventually they will lose their business leading to the death of company if these lost customers don’t come back to Chembright. Therefore doing nothing is not a solution or alternative at all.…

    • 819 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Considering that Target is one of the largest retailer organization, there are steps that must be taken in order to continue their effective method of operating the organization. First Target will need to assess their market by analyzing their internal and external state of the business and how it affects the organization in general. Target will need to review and understand who are their customers, what strengths and weaknesses each competitor may have, and the issues, which are occurring within the world that may affect the business overall. The company will also have to…

    • 1181 Words
    • 6 Pages
    Good Essays
  • Better Essays

    Target Financial Health

    • 1437 Words
    • 5 Pages

    In all of its 100 plus years of serving the community, Target has become the one stop shop for most households. With a variety of products ranging from toiletries to clothing, Target is what you would call the all-around retailer. With 1,793 stores throughout 49 states and 37 distribution centers in the United States, Target is taking the place or your local corner store (Target, 2014). This company’s sales, gross margins, and profitability are affected by current trends which alter consumer preferences, if Target does not comply with these changes it could negatively impact operating profit and cause Target to lose money on inventory items with spoilage and markdowns (Target, 2014).…

    • 1437 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    The rapidly evolving economy has led to companies being largely controlled by an IT infrastructure as it is an important part of business operations, and it bridges communication gaps well. Those corporations that pay no heed to the necessity of computer forensics in the modern age risk damage to digital resources and intellectual property. A singular breach into the system can lead to massive financial loss[1]; subsequently leading to bad publicity of the business and prolonged losses in the long run. The methods used by attackers to breach into networks are constantly advancing as a result of experts who are able to fend off attacks. This is a cause for concern for experts worldwide. It is important to bear in mind that threats can be both…

    • 217 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Describe Target Behavior

    • 422 Words
    • 2 Pages

    My target behavior is to exercise at least three days a week for at least 1 hour and I recorded this information using my cellphone.…

    • 422 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    When you discover that your character is being attacked online, or in another situation it can make you feel panicked, and scared. There are some things you can do to help remain calm and levelheaded enough to deal with the situation properly.…

    • 394 Words
    • 2 Pages
    Good Essays