What factors were responsible for the Target and Equifax breaches? Who should have been responsible for these
Question:
What factors were responsible for the Target and Equifax breaches? Who should have been responsible for these breaches? How do you think the firms could have prevented the attacks, and what should they do in the future to heighten security and win back customer trust?
Fantastic news! We've Found the answer you've been seeking!
Step by Step Answer:
Answer rating: 100% (6 reviews)
The Target and Equifax breaches were significant cybersecurity incidents that exposed sensitive customer data Here are the factors responsible for these breaches the parties that could have been held responsible and some measures that could have been taken to prevent them and rebuild customer trust Target Breach 1 Attack Vector The Target breach occurred in late 2013 and was primarily a result of a cyberattack on the companys pointofsale POS system Attackers gained access to Targets network using credentials stolen from a thirdparty vendor 2 Responsibility Several parties could be held responsible Target itself for inadequate security practices and monitoring The thirdparty vendor Fazio Mechanical Services whose credentials were compromised The attackers who initiated the breach 3 Prevention Improved network segmentation Target could have better isolated its POS system from other parts of its network to limit the scope of the breach Stronger authentication Implement multifactor authentication to protect against credential theft Regular security audits Periodic reviews and assessments of security controls can identify vulnerabilities 4 Rebuilding Trust Improved cybersecurity practices and regular updates to the public about security measures Compensation and support for affected customers Enhanced data protection measures to prevent future breaches Equifax Breach 1 Attack Vector The Equifax breach occurred in 2017 and was a result of a web application vulnerability in the companys website software Attackers exploited this vulnerability to gain access to sensitive customer information 2 Responsibility Equifax The company was widely criticized for not promptly patching a known vulnerability Regulatory bodies and auditors They should have ensured Equifaxs compliance with security standards The attackers responsible for the ...View the full answer
Answered By
PALASH JHANWAR
I am a Chartered Accountant with AIR 45 in CA - IPCC. I am a Merit Holder ( B.Com ). The following is my educational details.
PLEASE ACCESS MY RESUME FROM THE FOLLOWING LINK: https://drive.google.com/file/d/1hYR1uch-ff6MRC_cDB07K6VqY9kQ3SFL/view?usp=sharing
3.80+
3+ Reviews
10+ Question Solved
Related Book For
Information Systems A Managers Guide To Harnessing Technology Version 7.0
ISBN: 9781453394045
1st Edition
Authors: John Gallaugher
Question Posted:
Students also viewed these Computer science questions
-
Googles ease of use and superior search results have propelled the search engine to its num- ber one status, ousting the early dominance of competitors such as WebCrawler and Infos- eek. Even later...
-
In January, the board of directors of the Montgomery Corporation, one of Canada's largest retail store chains, was having its regularly scheduled meeting to establish and declare the next quarterly...
-
Planning is one of the most important management functions in any business. A front office managers first step in planning should involve determine the departments goals. Planning also includes...
-
Draw with Ruler Touch Touch 4x For each of the three simple circuit boards you will need to calculate the total resistance, Req, for the entire circuit board by using the measured resistances of each...
-
1. List some specific employment examples where a postemployment noncompetition agreement would be enforceable. 2. Why did the North Carolina Court of Appeals refuse to enforce the noncompete...
-
Smithston Corporation leased equipment to Dayplanner Co. on January 1, 2011. The terms of the lease called for annual lease payments to be made at the first of each year. Smithstons implicit interest...
-
Evaluate instances of mental model failure/trauma that led to changes in your mental model.
-
Standard Olive Company of California has a convertible bond outstanding with a coupon rate of 5 percent and a maturity date of 20 years. It is rated Aa, and competitive, nonconvertible bonds of the...
-
QUESTION 7 (24 marks) Below is the shareholders' equity section of Samson Corporation's statement of financial position as at January 1, 2019. Shareholders' Equity: $600,000 Ordinary shares, $5 par...
-
Why are threats to the power grid potentially so concerning? What are the implications of power grid failure and of property damage? Who might execute these kinds of attacks? What are the...
-
What sorts of security regimes are in use at your university, and at firms you've worked or interned for? If you don't have experience with this, ask a friend or relative for their professional...
-
Length of open belt connecting two pulleys of radii \(r_{1}\) and \(r_{2}\) and at a center distance \(D\) apart, is: (a) \(\pi\left(r_{1}+r_{2} ight)+\left(r_{1}-r_{2} ight)^{2} / D+2 D\) (b)...
-
When I consider optimizing the portfolio allocation for both my 403(b) and CALSTRS retirement accounts, I find it crucial to employ a well-structured model to ensure that my investments align with my...
-
How can you use your understanding of diversity to develop your relationship-building skills in your healthcare career?,Explain ways in which religion can help or hinder individuals as they build...
-
Think back to a time you experienced a communication breakdown in a personal or social setting (something you're comfortable discussing with the class in a public forum). 1. Did you figure out why...
-
Imagine you are visiting your aunt, who is a patient in a hospital in a nearby city. While you are sitting at her bedside, you hear a lot of noise at the nurses' station, as if they are having a...
-
Using Houseplan #5 on page 4 of the Measurement supplement(below), determine the cost of pouring the 9 inch thick concreteslab for this home, assuming that the porch will also be on thefoundation....
-
Describe the location and structure of the pancreas.
-
Fill in each blank so that the resulting statement is true. 83 + 103 = ______ .
-
Consider two networks, N1 and N2, that have the same average delay between a source A and a destination D. In N1, the delay experienced by different packets is unformly distributed with maximum delay...
-
In Fig. 6-36 we saw that in addition to the 32-bit acknowledgement field, there is an ACK bit in the fourth word. Does this really add anything? Why or why not? Figure 6-36 32 Bits Source port...
-
Describe two ways to get into the SYN RCVD state of Fig. 6-39. Figure 6-39 (Start) CONNECT/SYN (Step 1 of the 3-way handshake) CLOSED CLOSE/- LISTEN/- CLOSE/- SYN/SYN + ACK LISTEN (Step 2 of the...
-
600 ? ? ? PA3. LO 3.2 Fill in the missing amounts for the four companies. Each case is independent of the others. Assume that only one product is being sold by each company. Company A Company B...
-
Question 2 : Cost V olum e - Profit (3. 0 ) Zan Bun is the sole producer of cakes in the Changlun region. The company only produces one type of cake, and it is sold at $10 each. The variable cost for...
-
39 40 Which of the following would result in an end-of-period adjustment for an accrued expense? Salaries owed to employees but not yet paid. Fees earned but not yet received. Equipment that...
Study smarter with the SolutionInn App