In this assignment, you will read the article, “Teaching Case: Security Breach at Target.” Then you will write a 3-4 page case analysis in which you:
- Outline the security breach at Target.
- Describe how Target became aware of the security breach.
- Examine the security breach’s impact on Target’s customers.
- Recommend security controls that could have been implemented to prevent the data breach from occurring.
- Research how the data breach at Target affected Target’s and other companies’ security practices.
- Go to Basic Search: Strayer University Online Library to locate and integrate into the assignment at least three quality, peer-reviewed academic resources, written within the past five years.
- Include your textbook as one of your resources.
- Wikipedia and similar websites do not qualify as quality resources.
Struggling with where to start this assignment? Follow this guide to tackle your assignment easily!
Step-by-Step Guide to Writing Your Paper
Step 1: Understand the Assignment Requirements
- Carefully read the case study, “Teaching Case: Security Breach at Target.”
- Identify the key points you need to cover:
- Outline of the security breach.
- How Target became aware of the breach.
- The impact on customers.
- Recommended security controls to prevent future breaches.
- Research on how this breach influenced security practices in other companies.
- Use at least three peer-reviewed academic resources (published within the past five years) from the Strayer University Online Library, including your textbook.
Step 2: Conduct Research
- Search the Strayer University Online Library for scholarly articles related to:
- The Target security breach case study.
- Best practices for data security and breach prevention.
- The broader impact of the breach on security policies in other companies.
- Avoid unreliable sources like Wikipedia.
- Take detailed notes on key findings.
Step 3: Structure Your Paper
Introduction:
- Introduce the case study and its significance.
- Provide a clear thesis statement summarizing the key discussion points.
Body Paragraph 1: Security Breach Overview
- Explain what happened during the breach.
- Discuss the vulnerabilities that were exploited.
Body Paragraph 2: Discovery of the Breach
- Describe how Target identified the security breach.
- Explain any external notifications or internal discoveries.
Body Paragraph 3: Impact on Customers
- Analyze how the breach affected Target’s customers.
- Discuss financial and reputational consequences.
Body Paragraph 4: Recommended Security Controls
- Suggest security measures that could have prevented the breach, such as:
- Multi-Factor Authentication (MFA)
- Advanced threat detection systems
- Network segmentation
- Regular security audits
Body Paragraph 5: Influence on Security Practices
- Research how the breach influenced Target’s future security measures.
- Examine its impact on security policies in other organizations.
Conclusion:
- Summarize key points and reinforce your recommendations.
- Provide a closing thought on the importance of cybersecurity.
Step 4: Cite Your Sources Properly
- Use Strayer Writing Standards (SWS) for in-text citations and references.
- Ensure proper formatting and complete reference details.
Step 5: Review and Edit
- Proofread for grammar, clarity, and coherence.
- Ensure logical flow between sections.
- Double-check citation accuracy.
By following these steps, you can confidently structure your assignment and submit a well-researched, properly formatted paper. Good luck!
Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount