2b: Case Study 2 Autopsy of a Data Breach: The Target Case
Question 1
What steps did the cybercriminals follow in committing this theft?
Question 2
What factors allowed this theft to take place?
Question 3
What are the consequences of the breach for the stakeholders?