Risk management Assignment on Data Breach at Target
The data breach at Target was significantly broader than originally reported: the company said Friday that 70 million customers had information such as their name, address, phone number and e-mail address hacked in the breach. Target said the personal data stolen could affect its past shoppers -- not just those who have visited the store recently. the breach occurred in the weeks following Thanksgiving when as many as 40 million customers may have also had credit or debit card information stolen. A Target spokesperson said there may be overlap b/t the two groups, but they do not currently know the extent. Target said it would try to reach customers for whom it has e-mail addresses to inform them of the breach. It cautioned that it would not ask customers to provide any personal information and warned customers not to respond to any e-mail claiming to be from Target. Target: Hacking hit up to 110 million customers - Jan 10 2014. Target: Hacking hit up to 110 million customers - Jan. 10, 2014. ONLINE Available at: http://money.cnn.com/2014/01/10/news/companies/target-hacking/
a) Define risk management , risk identification , and risk control b) Describe how target could have used risk management and security planning in order to reduce or avoid security attacks from taking place i) A discussion potential consequences of not planning for security risks ii) A discussion of the information needed to make the decision security decision;
TASK 2 Provide an overview of the suggested approach for the security systems development life cycle (SDLC) This should include:
i) A diagram of the life cycle for the approach; ii) A brief overview of each phase in the life cycle; iii) A listing of the principles associated with the approach; iv) A brief overview of the techniques used in the approach.
Research & Presentation:
Your work should be word processed and presented in the form of a report ( 2000 words). Credit will be awarded for good presentation (e.g report is well structured and work has been spell checked, etc.) You must support your answers for TASK 1 to 2 by referring to appropriate literature. Credit will be awarded for the range of reference sources consulted, how well they are used within the report and the correct use of the Harvard System of Referencing.
Looking for a Solution to the Assignment above, we have a team of experts who have
a complete expertise in completing this assignment within your specified deadline. The
assignment will be uniquely made for you and will be delivered along with Turnitin Plagiarism