Case Study Of Target's Attack Response Strategy

Improved Essays
Answer. Yes, Target story does indeed follow the general “ATP kill chain” attack model as clearly elaborated upon in the case study. Attackers started by performing“Reconnaissance”over one of Target’s external heating and ventilation providers, Fazio Mechanical Servicesprobably after prior deep investigation to detectan easy loophole to infiltrate Target’s network for its malicious objectives.Also,Fazio relied onfree version of a security software called, “Malwarebytes Anti-Malware”, whose license explicitly prohibited corporate use; which is a fineexample of Overreliance on knowledge versus intelligence. This information was further used by the attackers to enter the “Weaponization”phase to execute a phishing campaignagainst thisexternal vendorbymeans …show more content…
NaikPIN numbers were stolen as wellwhichwould have had helped towards stabilising and mitigating the impact;the decision to continue operating stores inspite of breach discovery by Target CEO Gregg Steinhafel on December 12th;poor customer support services through call centres further leadcustomers helpless and unable to protect themselvesdue to lack of information.These were a result of lack on appropriate response strategyindicatingOverreliance on intuition to make security decisions.Q3. What recommendations would you give to the company in order to improve their security operations?Answer. My personal recommendation for the company would be to first of all design an appropriate attack response strategy,protocol in order to better handleany future attacks;improvise on the network segmentation to better safeguard confidential information,act upon system vulnerabilities as soon as reported,include assessment of security implementation by the external vendor’s as part of the pre-requisites before providing them access to Target’snetworkto minimize the attack surface,create a list of approved servers and internet connections Target’s network shouldcommunicate within order to make sureallcracksinsecurity foundationare fixed; prioritizingsecurity reports, alerts by Target’s security teams,their intrusion detection software like the FireEye software, the FireEye Teamby buildingsituationalawareness of the evolving state of attacks

Related Documents

  • Improved Essays

    Nt1330 Unit 2

    • 369 Words
    • 2 Pages

    Based on the findings obtained from the analysis of security information then compiled recommendations for improvement of the condition of the company. Some recommendations are: 1. Describe in detail the confidentiality agreement and specifically including maintaining the confidentiality of the password 2. Reexamination of the access rights of each and updating access rights in case of transfer of part or advancement in accordance with their respective access rights. 3.…

    • 369 Words
    • 2 Pages
    Improved Essays
  • Superior Essays

    (1) Discuss the Aum Shinrikyo attack. What made the attack successful? Why were the casualties relatively low? March 20, 1995 a major subway line in Tokyo, Japan was attacked by the Aum Shinrikyo cult.…

    • 950 Words
    • 4 Pages
    Superior Essays
  • Improved Essays

    To combat these concerns, the team focused on four different controls. Insider Attack: The setting on the firewalls was set to maximum. The setting allowed the network reject, block, or deny potentially malicious payloads that would allow access. Authentication, RBAC, IDPS, and firewalls were used in conjunction to reduce insider threat opportunities. Additionally, these systems notified network administrators of any foreign presence within the boundary.…

    • 1194 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Ba501 Week 1 Assignment

    • 740 Words
    • 3 Pages

    II Abstract Security is a need that is increasing at a rapid rate especially with a large organization and constant changes seem to be the norm.…

    • 740 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    Target quickly removed the malware that was being utilized by the cybercriminals Date 5: December 19, 2013 (34 days after Date 1) – Target officially announces attack and the theft of debit/credit information. Target also launched a major public relations operation to assure their customers that the technology used by the attackers had been found and…

    • 591 Words
    • 3 Pages
    Great Essays
  • Decent Essays

    9/11 Security Strategies

    • 142 Words
    • 1 Pages

    What are your thoughts on how the department of homeland security as implemented its security strategies to mitigate…

    • 142 Words
    • 1 Pages
    Decent Essays
  • Great Essays

    Target Executive Summary

    • 1564 Words
    • 7 Pages

    In 2013, in the days prior to Black Friday, hackers stole credit card information for millions of Target customers. The hackers set their traps and planned the data’s escape course. They uploaded exfiltration malware to move stolen credit card numbers. To cover their tracks, they first moved the stolen numbers to staging points spread around the United States. The information was then moved into the hackers’ computers in Russia.…

    • 1564 Words
    • 7 Pages
    Great Essays
  • Improved Essays

    Triple Threat Case Study

    • 1000 Words
    • 4 Pages

    1. Anabolic steroids disrupt a delicate balance of hormones in the body. Give three examples of these changes in terms of the physical side effects of steroid abuse. The abuse of anabolic steroids have a direct effect on the hormonal secretion in the body.…

    • 1000 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    Identify strategies to control and monitor each event to mitigate risk and minimize exposure Identify at least two types of security events and baseline anomalies that might indicate suspicious activity. One type of a security event that might indicate supicious activity is an authentication failures found in audit logs. Audit logs contain a high volume of events so particular attention on which events that should be specifically tracked and managed require consideration. An audit log can identify patterns of activity that can signal a security a potential breach. Whether the attack was successfull or not the audit information should be stored in a central respository for future forensic refernce if ever needed.…

    • 1084 Words
    • 5 Pages
    Superior Essays
  • Improved Essays

    The atomic bombs may have been dropped in Japan, but their power was perceived around the world. Following the conclusion of World War II, newly-elected President Dwight Eisenhower quickly ended the fight in Korea, and made it a goal to keep the still threatening Soviet Union at bay, while also avoiding conflicts in Asia. Secretary of State John Dulles proposed multiple alliances between powerful countries; however, this proposal lost traction after proving ineffective. Eisenhower also wanted to use technology advances as a means to keep the Soviets at bay, namely the strategic use of nuclear weapons, through his New Look policy. This policy worked to rapidly advance wartime technology while simultaneously cutting back our conventional forces.…

    • 770 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Question #1: What would be your response to the order? Explain in detail. My first response towards the operation order is to question the necessity of forcefully removing local evacuee from their homes and destroying their property if they refuse to evacuate. Then explain to the commander that this type of action is prohibited and in clear violation of the Law of War. My second response will be to advice that the operation order be revised before the execution of the order because the destruction of civilian property unnecessary and cannot be justified under military necessity.…

    • 686 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Target Breach

    • 1769 Words
    • 8 Pages

    Most people can remember the Target breach, whether they were affected by it or not. Personally, this was the first big data breach that I remember, and I was one of the millions affected by it. While I do not shop at Target often of course I bought one thing from the store during the time of the breach. I was a nervous wreck, my wife was even worse. Luckily the only thing affected was our nerves and not our personal identities.…

    • 1769 Words
    • 8 Pages
    Improved Essays
  • Decent Essays

    Art Attack Case Study

    • 215 Words
    • 1 Pages

    Art Attack will make their profit off of people attended the classes and just coming in to create art. Sales from this business are estimated at 120,000 the first year, and then will increase as the years go on. The location of the business has been decided to be on Main Street in Clarion Pennsylvania. Since there is not much competition around, there was not really a restriction on where the business would be located. One thing we took into consideration was that it was in walking distance for college students.…

    • 215 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Intergroup Attack Theory

    • 813 Words
    • 4 Pages

    In the New York Times article “A Social Reflex: Police and Blacks, Seeing Threat, Close Ranks” Amanda Taub discusses the “intergroup threat theory” as well as how conflicts effects group dynamics such as group cohesion and what she describes as “out-group hate” (Taub, Amanda.) Going in sync with the article, Taub talks about how threats, whether its focused on single members or the entire group as a whole, changes the behaviors of the people who identify with said group. These conflicts can range from actual violence directed towards the group to just changes to the infrastructure on the group. These threats however, can also rise “out group hate” or a prejudice towards other groups. In the article Taub uses the example of police shootings…

    • 813 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Cenartech Case

    • 884 Words
    • 4 Pages

    One of the few saving graces was the IT manager’s awareness of the great need for standardizing backup procedures and related disaster recovery capabilities (Whitman & Mattord, 2011). This allowed the IT department to have the ability to recover almost everything that had been deleted or changed very quickly. The second saving grace was the firewalls between the different networks had prevented the attacker from connecting and causing further damage after being fired (Whitman & Mattord, 2011). Lastly, even if the IT manager was fairly new to this company, in two years it would seem he should he should have noted that employees were using the shared archaic, still-active accounts (Whitman & Mattord, 2011).…

    • 884 Words
    • 4 Pages
    Improved Essays