Information Technology Management Case Study help

Anonymous
timer Asked: May 18th, 2016
account_balance_wallet $20

Question Description

Each case study consists of a formal summary of the case in question along with answers to several follow-up questions that will be provided by the professor. A case study will touch on aspects of the case, including causes, factors, stakeholders, and possible solutions to the problem at hand. Your paper should perform a critical analysis on the study and should primarily be in your own words, but you may cite the book as needed. You must include at least three other additional outside peer-reviewed sources to help support the claims in the case study. These sources, along with the case study, should be properly cited in APA format. Failure to properly cite material may severely affect your grade.

When you write papers for this class, please note that I expect you to summarize the articles in your own words, not cut and paste the text from the article and submit it. The purpose of the articles is to encourage you to read current material about the subjects, assimilate it, and be able to summarize it in your own words. Copying an article and submitting it as your work is plagiarism and is against school and class rules. Individuals found plagiarizing material will receive an F and face possible Academic Dishonesty charges. 

Additional requirements:

  • Answer each question separately and please number your answers.

 Case 1 Opening Case: BlackPOS Malware Steals Target’s Customer Data P. 142

 1. Was cybersecurity a priority at Target? Explain.

 2. How did lax security impact Target’s sales revenue and profit performance?

 3. According to experts, how was the data breach executed?

 4. In addition to the data theft, what else was damaged by this incident?

 5. Was this cybersecurity incident foreseeable? Was it avoidable?

6. Why might management not treat cyber-threats as a top priority?

 7. Research recent news concerning this data breach. Has Target recovered from it? Explain.

 8. Assuming that the CEO and CIO were forced to resign, what message does that send to senior management at U.S. companies?

*1000 words minimum.  3 references minimum cited in AP Format.

**Absolutely no plagiarism.  Paper will be submitted thru turnitin.


Thank You.

Price is negotiable.




Tutor Answer

Bundoc
School: Boston College

Heading head: BLACKPOS MALWARE STEALS TARGET’S CUSTOMER

BlackPOS Malware Steals Target’s Customer
Name:
Course:
Instructor:
Date:

BLACKPOS MALWARE STEALS TARGET CUSTOMER
1. Was cybersecurity a priority at Target? Explain.
No, security at target was not a priority. Notably, target had issued network entrance to a
third-party dealer, particularly a minor Pennsylvania HVAC organization, which didn’t strictly
monitor widely recognized information security observations at that time. The dealer’s feeble
security measures were the loophole that granted attackers access to the Target’s network.
2. How did lax security impact Target’s sales revenue and profit performance?
The attack left the targets productivity activities immensely vandalized. Considering the
Profits, they dropped by a margin of 46% in the fourth quarter of 2013 throughout the crucial
break period. Additionally, Buyer stopovers fallen during the New Year, a case that aggravated
the losses (Halkias, 2014).
3. According to experts, how was the data breach executed?
The breach was executed in the following ways:
1. The attacker carried out reconnaissance. This entailed a google search that provided a huge
sum of information concerning the target cooperation with merchants. The Outcomes exposed a
retailer threshold together with a list of HVAC and preservation corporations. Also, this
exploration shown a thorough situational study on the Microsoft web site, which labels how the
target interacts with the Microsoft virtualization program, consolidated designation
determination and Microsoft System Center Configuration Manager (SCCM), to install safety
reinforcements and system apprises. Looking at the situation study, it defines the subject’s
technical setup, plus the POS system information, in profound aspect (Microsoft, 2011).
2. The attackers sent email comprising the malware to a preservation retailer, Fazio
Mechanical, just two months preceding the credit card cracking. The Malware installed on
merchant d...

flag Report DMCA
Review

Anonymous
Tutor went the extra mile to help me with this essay. Citations were a bit shaky but I appreciated how well he handled APA styles and how ok he was to change them even though I didnt specify. Got a B+ which is believable and acceptable.

Similar Questions
Hot Questions
Related Tags
Study Guides

Brown University





1271 Tutors

California Institute of Technology




2131 Tutors

Carnegie Mellon University




982 Tutors

Columbia University





1256 Tutors

Dartmouth University





2113 Tutors

Emory University





2279 Tutors

Harvard University





599 Tutors

Massachusetts Institute of Technology



2319 Tutors

New York University





1645 Tutors

Notre Dam University





1911 Tutors

Oklahoma University





2122 Tutors

Pennsylvania State University





932 Tutors

Princeton University





1211 Tutors

Stanford University





983 Tutors

University of California





1282 Tutors

Oxford University





123 Tutors

Yale University





2325 Tutors