Now that we have had an introduction to security protocols that will help reduce the risk of a security incident we are going to study security incidents.Select a recent security incident that had their data stolen by an outside attack, insider threat, or some other mechanism.  There are multiple examples that can be used, i.e., Target, Capital One, Home Depot, OPM, etc.  As you evaluate the incident you evaluate several components throughout the remainder of the course. 1. select a security incident, there are examples above 2. create a 1-page introduction of the security incident 3. Your response must be properly APA formatted with every sentence that comes from another source cited or quoted. 4. The submission will go through safe-assign to check for plagiarism.  If a high level of plagiarism is detected this will result in a zero for the assignment and the school will be notified. 5. There are no makeup attempts on any assignments Below are some examples of security incidents that have occurred. You may choose any security incident that has occurred and impacted the user’s data. Purchase the answer to view it

Introduction

In recent years, there have been several high-profile security incidents involving the theft of data by outside attackers, insider threats, or other mechanisms. These incidents have highlighted the increasing vulnerability of organizations to cyber attacks and the importance of implementing effective security protocols. This paper aims to analyze one such security incident – the data breach at Target – and evaluate various components related to the incident.

The Target Data Breach

The Target data breach occurred in 2013 and is considered one of the largest retail data breaches in history. The incident involved the theft of credit card and personal information of approximately 40 million customers who had shopped at Target stores during the holiday season. Additionally, the personal information of 70 million customers, including names, addresses, phone numbers, and email addresses, was also compromised.

The attackers gained access to Target’s system through a phishing email sent to an employee of an HVAC vendor that was associated with Target. This email contained malware that allowed the attackers to infiltrate Target’s network and ultimately gain access to customer data. Once inside the network, the attackers installed malware on Target’s point-of-sale (POS) systems, which were responsible for processing credit and debit card transactions. This malware helped capture sensitive payment card information, including card numbers, expiration dates, and CVV codes, as customers made purchases at Target stores.

The incident remained undetected for several weeks, allowing the attackers to continue their activities and compromise a significant amount of customer data. It was only after receiving reports of fraudulent activities from credit card companies that Target became aware of the breach. The company immediately launched an internal investigation, enlisted the help of third-party experts, and notified law enforcement agencies about the incident.

Impact and Response

The impact of the Target data breach was far-reaching, affecting not only the company but also its customers and the broader retail industry. Target faced significant financial losses, including costs associated with the forensic investigation, legal settlements, and a decline in customer trust and loyalty. Furthermore, the incident led to the resignation of the company’s CEO and other top executives.

In response to the breach, Target took several steps to address the incident and prevent further attacks. The company apologized to affected customers and offered free credit monitoring services for a year. Target also accelerated its adoption of EMV chip technology, implemented more rigorous security measures, and increased investment in cybersecurity. These actions aimed to restore customer confidence and enhance the protection of customer data.

Conclusion

The Target data breach serves as a warning to organizations about the potential consequences of inadequate security measures and the increasing sophistication of cyber attacks. This incident highlights the importance of implementing robust security protocols, including employee training to prevent phishing attacks, robust intrusion detection systems to detect and respond to attacks, and regular security audits to identify vulnerabilities. By learning from such incidents, organizations can take proactive measures to strengthen their security posture and protect sensitive customer data.

Need your ASSIGNMENT done? Use our paper writing service to score better and meet your deadline.


Click Here to Make an Order Click Here to Hire a Writer