Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Discuss the Target data breach of 2013 . It was the first major data breach to receive truly substantial media coverage and not have that

Discuss the Target data breach of 2013. It was the first major data breach to receive truly substantial media coverage and not have that coverage die off immediately after (as with most other breaches before and since). It also brought the Lockheed-Martin Cyber Attack Kill Chain model into the common cybersecurity lexicon. Required reading is listed below.

Being able to present and summarize the key concepts of a complex cybersecurity incident in a short time frame is an important skill to master. Remember that unless you are talking to other cybersecurity professionals, probably no one thinks this stuff is as interesting as you do.

Instructions: The main purpose of the discussion assignments is to get you to dig into the main four cybersecurity frameworks and references we use in the class. Use the context of the specific security incident to explore and explain some aspects of the NIST CSF, the CIS CSCs, ACSC Strategies to Mitigate Cyber Incidents, and the MITRE ATT&CK matrix.

Keep each discussion sub-topic focused..

The format for this discussion will be as follows:

(1) Quickly summarise the key aspects of the data breach.

(2) NIST CSF reflection.

(3) CIS CSCs reflection.

(4) ACSC Strategies to Mitigate Cyber Incidents reflection.

(5) MITRE ATT&CK reflection.

REFERENCES

Committee on Commerce, Science, and Transportation. (2014). A Target 2013 kill chain analysis of the 2013 Target data breach. Washington, DC: U.S. Senate. Retrieved from https://www.commerce.senate.gov/services/files/24d3c229-4f2f-405d-b8db-a3a67f183883

Shu, X., Tian, K., Ciambrone, A., & Yao, D. (2017). Breaking the Target: An analysis of Target data breach and lessons learned. Ithaca, NY: arXiv, Cornell University. Retrieved from https://arxiv.org/pdf/1701.04940.pdf

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image_2

Step: 3

blur-text-image_3

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Essentials of Database Management

Authors: Jeffrey A. Hoffer, Heikki Topi, Ramesh Venkataraman

1st edition

133405680, 9780133547702 , 978-0133405682

More Books

Students also viewed these Databases questions

Question

Explain what a subroutine is.

Answered: 1 week ago

Question

How do we effectively and correctly analyze the waveform from ISim?

Answered: 1 week ago