Synergistic Security: A Work System Case Study of the Target Breach
Recent publicized security breaches can be used to evaluate information security programs. The processes and procedures that allowed the event to occur can be examined in a case study and then be used to find methods for future mitigation of risk. The Target security breach is used in this study to...
Saved in:
| Main Author: | Martha Nanette Harrell |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Kennesaw State University
2017-12-01
|
| Series: | Journal of Cybersecurity Education, Research & Practice |
| Online Access: | https://digitalcommons.kennesaw.edu/jcerp/vol2017/iss2/4/ |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Breach-rhythm
by: M. B. Mironov, et al.
Published: (2021-07-01) -
Hong Kong Security Law 2020: Between State Sovereignty and Breach of Treaty
by: Ken Bagus Setya Dharma, et al.
Published: (2022-07-01) -
From Breaches to Breachers
by: Despina Christoforidou
Published: (2024-12-01) -
Effect of uncertainties in breach location and breach mechanisms on risk‐related classification of off‐stream reservoirs
by: Nathalia Silva‐Cancino, et al.
Published: (2025-03-01) -
Breaching of human rights in Kosovo and Metohija (1999-2014): A case study
by: Đokić Bojan
Published: (2015-01-01)