Access over 20 million homework & study documents

search

ITS446 PM1 docx

Content type
User Generated
Rating
Showing Page:
1/5
Running head: PORTFOLIO MILESTONE: OUTLINE 1
Portfolio Milestone: Outline
ITS446 Securing Virtual and Cloud Systems
Colorado State University Global Campus

Sign up to view the full document!

lock_open Sign Up
Showing Page:
2/5
PORTFOLIO MILESTONE: Outline 2
Portfolio Milestone: Outline
Introduction Major Breach in a Virtualized Environment
Breach Analysis of Home Depot’s Virtualized Environment
Virtualization advantages.
Virtualization disadvantages.
What Went Wrong?
Network breach. On September 2
nd
, 2014, Home Depot began an investigation into a
possible network breach. Initially, there were completely unaware of the scope and impact that
the breach would have on the company (Hawkins, 2019).
Data breach. On September 8
th
, 2014, Home Depot confirmed that breach of its
networks led to a data breach of its payment security systems that has affected 56 million
customers in the US and Canada (Home depot security breach fallout begins, 2014).
Investigation finds the presence of malware. According to Steve Ragan (2014), Home
Depot has stated that the hackers “used unique, custom-built malware to evade detection. The
malware has not been seen previously in other attacks, according to our security partners.”
Result.
Why Did It Occur?
Home Depot’s supply chain.
Home Depot’s security controls.

Sign up to view the full document!

lock_open Sign Up
Showing Page:
3/5

Sign up to view the full document!

lock_open Sign Up
End of Preview - Want to read all 5 pages?
Access Now
Unformatted Attachment Preview
Running head: PORTFOLIO MILESTONE: OUTLINE Portfolio Milestone: Outline ITS446 – Securing Virtual and Cloud Systems Colorado State University – Global Campus 1 PORTFOLIO MILESTONE: Outline Portfolio Milestone: Outline Introduction – Major Breach in a Virtualized Environment Breach Analysis of Home Depot’s Virtualized Environment Virtualization advantages. Virtualization disadvantages. What Went Wrong? Network breach. On September 2nd, 2014, Home Depot began an investigation into a possible network breach. Initially, there were completely unaware of the scope and impact that the breach would have on the company (Hawkins, 2019). Data breach. On September 8th, 2014, Home Depot confirmed that breach of its networks led to a data breach of its payment security systems that has affected 56 million customers in the US and Canada (Home depot security breach fallout begins, 2014). Investigation finds the presence of malware. According to Steve Ragan (2014), Home Depot has stated that the hackers “used unique, custom-built malware to evade detection. The malware has not been seen previously in other attacks, according to our security partners.” Result. Why Did It Occur? Home Depot’s supply chain. Home Depot’s security controls. 2 PORTFOLIO MILESTONE: Outline 3 Home Depot’s legacy technology. Who Was Responsible? Home Depot executives. Officers and directors generally understand it is presumed that they are informed, acting in good faith, and with the company? ...
Purchase document to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Anonymous
I use Studypool every time I need help studying, and it never disappoints.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4