IT Security Breaches
Description In Target’s 2013 holiday data breach and cyber-attack, data belonging to millions of customers was disclosed. The hackers in the Target attack used legitimate credentials to initially enter the system. In 500 or more words, address social engineering and the most likely way the attackers used valid credentials to achieve their hack. This assignment requires the use of at least two additional scholarly research sources published within the last 5 years. Include at least one in-text citation from each cited source. Prepare this assignment according to the guidelines in the APA Style Guide. This assignment uses a rubric. Please review the rubric to the assignment to become familiar with the expectations for successful completion. Rubric Expectations Examine Social Engineering and Attack Methods 70.0 Student comprehensively describes social engineering; information and justifications are accurate and appropriate. Student examines the most likely way the attackers used valid credentials to achieve their hack with extensive details and examples. Subject knowledge is excellent. Sources 10.0 Sources are adequate, relevant, and extend beyond assigned readings. Quoted material and paraphrasing are included to support major points and writer’s idea development Argument Logic and Construction 10.0 Clear and convincing argument presents a persuasive claim in a distinctive and compelling manner. Language Use and Audience Awareness (includes sentence construction, word choice, etc.) 5.0 The writer uses a variety of sentence constructions, figures of speech, and word choice in distinctive and creative ways that are appropriate to purpose, discipline, and scope. Mechanics of Writing (includes spelling, punctuation, grammar, and language use) 5.0 The writer is clearly in command of standard, written academic English.
Leave a Reply
Want to join the discussion?Feel free to contribute!