Unit 8 Assignments
Assignment 1
- Read INFORMATION SYSTEMS: A MANAGER’S GUIDE TO HARNESSING TECHNOLOGY (Links to an external site.) Chapter 13 sections 13.1 – 13.4
Use this link.
- Answer the following Questions For TJMAX
- 1.Describe the TJMAX Breach
- How did the attackers get access
- What did they take
- What could TJMAX have done to avoid the breach
- 2. Briefly define each of the three members of the information security triad.
- 3. What does the term authentication mean?
- 4. What is multi-factor authentication?
- 5. What is role-based access control?
- 1.Describe the TJMAX Breach
Assignment 2
Read about the Target Breach at this link, and then answer the questions below
Answer the following questions:
- How did the breach occur.
- Why do you think it worked.
- Why were so many cards compromised.
- What was the “cost” of the breach.
- Who paid (what parties).
- Could this happen elsewhere.
- Supposedly, when the gangster Willie Sutton was asked why he robbed banks? He replied because that’s where the money is. How would that impact your approach to Security if you worked in a Retail chain like target vs a research organization vs you local police department (hint what are you trying to protect.)
- Why do you think ransomware attacks have become so much more prevalent in the last 5 years?