Blog

case study questions 38

10-8. Why did the attackers spear-phish a contractor to target?

10-9. Explain how a third-party contractor could weaken an organizations overall security?

10-10. Describe how data was stolen from Target?

10-11. How might a data loss at one organization affect other organizations

10-12. Explain why large organizations are attractive targets for attackers

10-13. Why might chip and pin cards reduce this type of theft

10-14. Why didn’t target have a CISO before the data breach

attached is the required reading