-8%

ACCT 350 ACCT350 ACCT/350 Week 2 Discussion-Security and Risk.docx

$23.99$25.99

ACCT 350 ACCT350 ACCT/350 Week 2 Discussion-Security and Risk.docx

Week 2: Discussion – Security and Risk. Finding a Real-life example
Do some research and find a news story that reports on a data breach, fraud, or other IT Security event (A good example is the Target data breach discussed in the text).
If needed do additional research to understand what the cause and impact of the breach or event were. Share the article with the class and address the following:

Description

ACCT 350 ACCT350 ACCT/350 Week 2 Discussion-Security and Risk.docx

Week 2: Discussion – Security and Risk. Finding a Real-life example
Do some research and find a news story that reports on a data breach, fraud, or other IT Security event (A good example is the Target data breach discussed in the text).
If needed do additional research to understand what the cause and impact of the breach or event were. Share the article with the class and address the following:
1) Provide a brief overview of the breach or event
2) Describe the cause (or suspected cause) of the breach or event.
3) How could a risk assessment possibly have prevented the breach or event? Or would a risk assessment have helped at all in identifying a possible vulnerability or risk exposure?
4) any other thoughts or questions you may have about the breach or event.
In April of 2014 with stolen third-party vendor logon credentials attackers were able to gain access to a Home Depot vendor’s system. While there, attackers took advantage of a zero-day