Oscar CardenasMISM 2301Professor Laughran 02/18/2021 Target Case Study 1.Describe the investments in people, process, and technology that Target had in place prior to the data breach incident.a.In 2006, Target decided to invest money into their IT securities to ensure the organizations protection as well as their customers from third parties. Target invested in a designated large-scale securities operation center or SOC to manageoverall IT security. The SOC used a multitude (300) of security analysts who would constantly monitor networks transmissions, server traffic, and device-levelalerts. Moreover, to ensure 24/7 protection Target hired another security team inIndia that would notify the SOC in case of any type of breach or red flags. Furthermore, a few months before the breach Target invested $1.6 million dollarsin a security firm call FireEye. This security firm had good reputation as it was handling security for a lot of different public and private companies that also had sensitive information. The way FireEye systems security worked was “to create a simulated; virtual IT infrastructure on which malware and data breach attempts could be detected prior to attacks on real operational devices and networks.” Essentially, its core purpose was to be able to prevent an attack. To prepare rather than react. The MIS framework can be discussed in this case study since Target invested in security with its operational goals in mind. It follows the cycle of how an organization uses the IS to improve and reach their goals. Improving security meant the betterment of their business.