Hospitality Information Systems

HB 337 Hospitality Information Systems
HW3

Name: ________________ PID: _________________

1. Please complete the table below based on the case study that you just read.
Q1. What caused this breach? What were the main risk sources (vulnerabilities) that jeopardized Target’s data? Who played what role in the breach? Q2. What should Target have done to protect itself against these risks?
Incompetent employees (Target’s employees)

Hackers

Business partners
Technology partners
Technology components

2. It is often said that if a company can ride out a storm, it will survive because consumers have very short memories. In fact, Target claims that six months after the attack, perceptions of its brand were back to their original, pre-breach levels. And they could not see any impact from the breach on sales. Given that observation, should companies still invest in information security?

3. As a future manager, what will you take away from this case?

Order from us and get better grades. We are the service you have been looking for.