Student Solution

-->

"Education is the most powerful weapon which you can use to change the world”
– Nelson Mandela

1 University

1 Course

1 Subject

5-1 Module Five Assignment

Module Five Assignment

Q Overview In this assignment, you will explore cybercrime. You will examine the Target data breach and evaluate its impact on both the individuals and the business. Prompt In this module, you have explored the impact of cybercrime. You will now evaluate a real world data breach to analyze its effects on individuals and a business. In 2013, Target was involved in a major data breach. Review the article Target to pay $18.5M for 2013 data breach that affected 41 million consumers for more information. This application of knowledge will help you prepare for Project Three in Module Seven, where you will prepare to present at a victim offender impact panel on cybercrime. • First, explain the cybercrime that took place. • Next, explain how this crime affected individuals. • Explain how this crime affected the business. • Then, indicate whether this example of cybercrime would modify your behavior as a consumer. If so, how? If not, explain your answer. • Last, indicate whether you or anyone you know has been affected by cybercrime. o Describe the type of crime you experienced. o What type of cybercrime was it? Specifically, the following rubric criteria must be addressed: • Explain the cybercrime that took place. • Explain how this crime affected individuals. • Explain how this crime affected the business. • Indicate whether this example of cybercrime would modify your behavior as a consumer. • Indicate whether you or anyone you know has been affected by cybercrime. Guidelines for Submission This assignment should be 300–400 words in length. Any references should be cited in APA style. For more information on APA style, review the Shapiro Library APA Style Guide.

View Related Questions

Solution Preview

In the scenario, because of the retail giant poor privacy policy policies, a cybercrime took place an attacker violates the privacy rules of the customers and took 41 million people's data which includes their account numbers, phone numbers, and credentials, email addresses, credit card verification code. The investigation shows that the cyber attackers gained the access to the computers of the targeted retail using the credentials that were first hacked by the third-party vendor. The main aim of attackers was to exploit the system's weak points and after getting the credentials they enter to target service database and then installed malware in the system to get access to the private data. (McCoy, 2017)