IT380 Module 6 Network Defense and Data Defense Discussion

User Generated

gnyx2jneelo

Computer Science

IT380

Unformatted Attachment Preview

IT 380 Module Six Case Study Analysis Guidelines and Rubric Overview: This case study will help you analyze a cyber security scenario and identify which tenets were violated. Each skill in this paper is an essential part of the final project and accompanying milestones in this course. Prompt: Choose either the Home Depot security breach or Target security breach from the articles below. Use the information provided to analyze the cyber security occurrence, determine which principles were violated, and recommend appropriate policies to prevent recurrence. Review the Module Six resources to complete this assignment. After reviewing the details surrounding these two major breaches and the information from Test Out from this module, answer the following questions. Select either the Home Depot breach or Target breach as your exemplar.     Which tenets of cyber security were violated in the breach? How were those attacks executed to bypass network defenses? What elements of network defense would have helped mitigate or prevent the breach? What elements of data defense would have helped mitigate or prevent the breach? What best practices would you recommend going forward to better secure the organization—both for overall defense and also to provide better detection? Based on the Test Out sections from this module and the additional module resource articles that you reviewed, your paper should address the following critical elements:    Identification of cyber security tenets that were violated and rationale of cause Analysis of data defense that would have helped mitigate or prevent this breach Recommendation of best practices to secure organization going forward Rubric Guidelines for Submission: Your paper must be submitted as a 2‐ to 3‐page Microsoft Word document with double spacing, 12‐point Times New Roman font, and one‐inch margins. All academic sources must be cited using the latest APA guidelines. Critical Elements Identification of Violated Cybersecurity Tenets Analysis of Data Defense Best Practices Recommendation Proper Use of Writing, Mechanics, and Grammar Exemplary (100%) Meets “Proficient” criteria and correctly identifies which tenets were violated, with empirical supporting examples Meets “Proficient” criteria and analysis demonstrates keen insight of data defense and prevention methods Proficient (90%) Correctly identifies which tenets were violated with supporting examples Needs Improvement (70%) Not Evident (0%) Identifies which tenets were Does not identify which tenets violated but supporting examples were violated have gaps Analysis demonstrates accurate knowledge of data defense and prevention methods Does not analyze the data defense and prevention methods 30 Meets “Proficient” criteria and recommendation demonstrates understanding of industry best practices that would remedy the situation appropriately Paper is free of errors in organization and grammar with applicable sources cited Recommends industry best practices to ensure proper resolution of scenario Analysis demonstrates knowledge of data defense methods but needs additional information to support prevention ideas Recommends a single best practice to remedy situation but recommendation has gaps in strategic implementation Does not recommend any industry best practices 30 Paper contains errors of organization and grammar but errors are limited enough so that assignments can be understood; cites applicable sources Paper contains errors of organization and grammar making the content difficult to understand 10 Paper is mostly free of errors of organization and grammar; errors are marginal and rarely interrupt the flow; cites applicable sources Total Value 30 100%
Purchase answer to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Attached.

Running head: HOME DEPOT CASE STUDY

Home Depot Case Study
Name
Institutional Affiliation

1

HOME DEPOT CASE STUDY

2

Home Depot Case Study
Tenets of cybersecurity that were breached
From the home depot case study, two of the security tenets in information technology
were breached. On the one hand, the confidentiality of the customer information was breached.
The system is supposed to secure all the information that belongs to both the organization and its
clients. The attackers were, therefore, able to gain access to the system and carried with them
some crucial information that belonged to the customers. The integrity of information is the other
tenet that was breached. Integrity refers to protection from unauthorized tampering of the data
(Gomzin 2014). By using the credit card information, the attackers were able to...


Anonymous
Goes above and beyond expectations!

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Similar Content

Related Tags