Security Assignments
Assignment Security 1
- Read INFORMATION SYSTEMS: A MANAGER’S GUIDE TO HARNESSING TECHNOLOGY (Links to an external site.) Chapter 13 sections 13.1 – 13.4
Use the link: https://open.lib.umn.edu/informationsystems/front-matter/publisher-information/
- Read Information Systems for Business and Beyond Chapter 6 Use the link: https://open.umn.edu/opentextbooks/textbooks/information-systems-for-business-and-beyond site.)
- Answer the following Questions For TJMAX
- 1.Describe the TJMAX Breach
- How did the attackers get access
- What did they take
- What could TJMAX have done to avoid the breach
- 2. Briefly define each of the three members of the information security triad.
- 3. What does the term authentication mean?
- 4. What is multi-factor authentication?
- 5. What is role-based access control?
- 1.Describe the TJMAX Breach
Assignment Security 2
Read about the Target Breach at the following link and then answer the questions below
https://sk-sagepub-com.ezaccess.libraries.psu.edu/cases/targets-debit-credit-card-data-breach
Answer the following questions:
- How did the breach occur.
- Why do you think it worked.
- Why were so many cards compromised.
- What was the “cost” of the breach.
- Who paid (what parties).
- Could this happen elsewhere.
- Supposedly, when the gangster Willie Sutton was asked why he robbed banks? He replied because that’s where the money is. How would that impact your approach to Security if you worked in a Retail chain like target vs a research organization vs you local police department (hint what are you trying to protect.)
- Why do you think ransomware attacks have become so much more prevalent in the last 5 years?