Академический Документы
Профессиональный Документы
Культура Документы
2. Anatomy of the Target data breach: Missed opportunities and lessons learned.
a. It is unclear if or how the Target breachers conducted any surveillance on Target but it
would have been as easy as an internet search. The people who breached the Target
network backed their way into it by first breaching the network of a third party
associated with target. It was noted in the investigation that the third parties did not
have malware protection up to par with that of a massive retailer.
b. (Kassner, 2015)
3. a) List the keywords you used to do the search.
Target, hack
b)Cite Internet article 2 in APA or MLA format.
(Michael Riley, March)
6. Formatting of document.
a) Place the title of the assignment and your name on the left side of the header.
Okay.
b) Place the page number in the center of the footer.
Consider it done.