Purpose  Familiarize yourself with the basic vocabulary in information security 

Important - Read this before proceeding

These instructions reflect a task our writers previously completed for another student. Should you require assistance with the same assignment, please submit your homework details to our writers’ platform. This will ensure you receive an original paper, you can submit as your own. For further guidance, visit our ‘How It Works’ page.

Purpose 
Familiarize yourself with the basic vocabulary in information security 
Understand the possible causes of major data breach 
Identify the vulnerabilities of a business 
Understand the principal measures a business can deploy
Instructions 
Please prepare a short paper based on the case description by answering the following questions.
The answer to each question should be at least 200 words. The answer for each question should be
clearly labeled with clear heading.
1. What steps did the cybercriminals follow in committing this theft? 
2. What factors allowed this theft to take place? 
3. What are the consequences of the breach for the stakeholders? Please cover different types of
internal and external stakeholders and both the positive and negative impacts. 
4. Take into account each of the sources of risks you identified in Question 2, what control measures
Target should have implemented to protect itself? 
5. Summarize your main takeaways from the Target case.
Note: Please submit your analysis paper on WebCampus via TurnItIn. The similarity percentage
should be below 15% to be graded.

Leave a Comment