Answer the following 3 questions in a way that demonstrates the depth of your understanding of the security and auditing concerns represented by the case. Your answers to the questions should be submitted to the Case 2 Assignment in Canvas. Your analysis should be single-spaced pages using 11 point Times New Roman font with one-inch margins, and the entire document should be limited to 3 pages (including the diagram for your answer to question 1.) Do not prepare a separate cover page, instead put your name, the class section number (MIS5206.001), and the case name in the top-left corner of the header. Add page numbers in the footer of the document. Your assignment should be saved as a PDF formatted file to Canvas, your PDF file should be named Case2-YourName.pdf
Answer the following 3 questions:
1) What steps did the cybercriminals follow in committing this theft?
- You may create a diagram to include in your answer that illustrates the steps the cyber-criminals followed in the Target exploit and breach and the detection of the breach
2) What factors allowed this theft to take place?
3) What are the consequences of the breach for the stakeholders?