100%(1)1 out of 1 people found this document helpful
This preview shows page 1 - 2 out of 2 pages.
1Target Case StudyAnalysisAs a company that has firmly invested in cyber security, Target experienced a massive shock by cyber criminals towards the end of 2013. Despite it having took great preventative measures against cyber threats, it was still prone to the hardships of data theft through malware links. Thebreach took in place in late September and the continual retrieval of customer credit card information as well as other general stats went on until late November, when Target began taking gradual action to retaliate and defend its customer databases. The breach wasn’t fully addressed until mid December, and Target hired security experts at Verizon to conduct a confidential investigation which hasn’t even been released yet (Krebs, 2015). Since the attack was indirect and was launched through one of the business’s third party network providers, it was difficult to identify immediately especially in the high concentration shopping season leading up to Christmas and New Years (Joyce, 2017). In order to understand how the incident occurred we would be wise to break down the total sum of investments made by Target to prevent this kind of security breach. Target invested in a