27 Jan Identify a major cloud breach of a U.S.-based company that has occurred in the recent past (within the last five years). use?
Identify a major cloud breach of a U.S.-based company that has occurred in the recent past (within the last five years). use Cloud Breach of a U.S Company- (Target Inc and Neiman Marcus). In an 8 page critical evaluation of your chosen breach, review and analyze the breach along the following dimensions: 1. What went wrong? 2. Why did it occur? 3. Who was responsible? 4. How could it have been prevented? 5. What advice would you offer to prevent such a breach from occurring in the future?
Running Head: MANAGING THE CLOUD 1
MANAGING THE CLOUD 2
Cloud Breach of a U.S- Based Company
Target Corp, Neiman Marcus, and Target Inc are three companies whose networks were breached over the holiday shopping season in 2014. I chose this topic because security breaches are becoming more prevalent in the U.S. Research shows that in recent years, retailers have improved their security, making it more difficult for hackers to obtain credit data using other approaches. In the 2014 attack, the main technique used by the attackers is through pieces of malicious software to steal data. One of the pieces of malware used is RAM scraper, or memory- parsing software which enables cyber criminals to grab encrypted data by capturing it when it travels through the live memory of a computer, where it appears in plain text.
I. Analyze and review of the breach of Target/Neiman Marcus
i. Analysis of the breach taken place
II. How did the breach take place and what went wrong?
i. Reasons for the breach
ii. When the breach took place
III. Parties responsible for the breach
i. Cyber criminals
ii. Method used by culprits to successfully carryout the breach:
a. Malicious software such as RAM scraper, or memory-parsing which allow the encryption of data
IV. How could the breach have been prevented
i. Steps that should have been taken to prevent it
V. Preventions taken to avoid future attacks
i. Steps to be taken to ensure and avoid attacks
VI. Conclusion
References
Arlitsch, K., & Edelman, A. (2014). Staying safe: Cyber security for people and organizations. Journal of
Library Administration, 54(1), 46-56.
Hughes, J. (2014). Data breeches in the cloud: Who is responsible? Retrieved from
http://mashable.com/2014/01/10/target-70-million-data-breach/#wxQQQFa6aaqq
Khodabacchus, M. Y., Soyjaudah, K. M. S., & Ramsawok, G. (2016). Fingerprint code authentication
protocol on cloud. In Emerging Technologies and Innovative Business Practices for the
Transformation of Societies (EmergiTech), IEEE International Conference on (pp. 162-166). IEEE.
Manworren, N., Letwat, J., & Daily, O. (2016). Why you should care about the Target data
breach. Business Horizons, 59(3), 257-266.
Watkins, B. (2014). The impact of cyber attacks on the private sector. Briefing Paper, Association for
International Affair, 12.
Wilkinson, C. (2013). CYBER RISKS: THE GROWING THREAT. Target data breech
Wong, A., Liu, V., Caelli, W., & Camtepe, S. (2014). Dataset validation within big data security architecture.
,
1. What went wrong?
2. Why did it occur?
3. Who was responsible?
4. How could it have been prevented?
5. What advice would you offer to prevent such a breach from occurring in the future?
The paper should meet the following requirements:
· Be 8 pages in length, not including the reference page.
· Your paper should include an introduction, a body with fully developed content, and a conclusion.
· Writing MUST be in APA format and 8 page double spaced
· Support your answers with the readings from the course and at least four scholarly journal articles.
· Cite a minimum of eight to 10 related sources—five of which should be academic peer-reviewed scholarly sources—to support your positions, claims, and observations
· Be clear and well-written, concise, and logical, using excellent grammar and style techniques.
*********I have also included a copy of an outline to show how I want the paper to flow, as well as links to articles of the topic I selected. PlEASE INCLUDE THE HIGHLIGHTED PORTION OF THE OUTLINE IN THE INTRODUCTORY PARAGRAPH, along with other things you come up with***** Thank you!!
https://iapp.org/news/a/target-and-neiman-marcus-we-did-all-we-could/
https://krebsonsecurity.com/2014/01/hackers-steal-card-data-from-neiman-marcus/
Our website has a team of professional writers who can help you write any of your homework. They will write your papers from scratch. We also have a team of editors just to make sure all papers are of HIGH QUALITY & PLAGIARISM FREE. To make an Order you only need to click Ask A Question and we will direct you to our Order Page at WriteDemy. Then fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.
Fill in all the assignment paper details that are required in the order form with the standard information being the page count, deadline, academic level and type of paper. It is advisable to have this information at hand so that you can quickly fill in the necessary information needed in the form for the essay writer to be immediately assigned to your writing project. Make payment for the custom essay order to enable us to assign a suitable writer to your order. Payments are made through Paypal on a secured billing page. Finally, sit back and relax.
About Wridemy
We are a professional paper writing website. If you have searched a question and bumped into our website just know you are in the right place to get help in your coursework. We offer HIGH QUALITY & PLAGIARISM FREE Papers.
How It Works
To make an Order you only need to click on “Order Now” and we will direct you to our Order Page. Fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.
Are there Discounts?
All new clients are eligible for 20% off in their first Order. Our payment method is safe and secure.
