Read Case 2: “Autopsy of a Data Breach: The Target Case”
-
- Note: Case studies are available in the course pack for purchase from Harvard Business Publishing: https://hbsp.harvard.edu/import/1076420
Answer the following 3 questions and post your analysis to Canvas:
- What sequence of steps did the cyber-criminals follow in committing this theft?
- What factors allowed this theft to take place?
- What are the consequences of the breach for each class of Target’s stakeholders?