CIS 562 Case Study 2 POS Attack

$50.00

CIS 562 Case Study 2 POS Attack

 

Case Study 2: POS Attacks

Due Week 4 and worth 100 points

 

Suppose you are a security director for a consulting firm that implements, secures, investigates, and supports point-of-sale (POS) for small and medium businesses (SMBs) in the retail industry.

 

Read the article titled, “If you shopped at these 16 stores in the last year, your data might have been stolen” located at https://www.businessinsider.com/data-breaches-2018-4 Choose 2 stores from the list and research the specific attack or breach.

 

Write a paper in which you:

  1. Summarize the attacks, providing details on the effects of the breach.
  2. Identify the common purpose of attacks on point-of-sale (POS) systems.
  3. Assess why and how these POS systems have become a prime target for hacking groups.
  4. Examine the forensics challenges that exist for investigations on POS systems.
  5. Use at least two (2) quality resources in this assignment other than the article linked above. Note:Wikipedia and similar websites do not qualify as quality resources.

 

Description

CIS 562 Case Study 2 POS Attack

 

Case Study 2: POS Attacks

Due Week 4 and worth 100 points

 

Suppose you are a security director for a consulting firm that implements, secures, investigates, and supports point-of-sale (POS) for small and medium businesses (SMBs) in the retail industry.

 

Read the article titled, “If you shopped at these 16 stores in the last year, your data might have been stolen” located at https://www.businessinsider.com/data-breaches-2018-4 Choose 2 stores from the list and research the specific attack or breach.

 

Write a paper in which you:

  1. Summarize the attacks, providing details on the effects of the breach.
  2. Identify the common purpose of attacks on point-of-sale (POS) systems.
  3. Assess why and how these POS systems have become a prime target for hacking groups.
  4. Examine the forensics challenges that exist for investigations on POS systems.
  5. Use at least two (2) quality resources in this assignment other than the article linked above. Note:Wikipedia and similar websites do not qualify as quality resources.

 

Reviews

There are no reviews yet.

Be the first to review “CIS 562 Case Study 2 POS Attack”

Your email address will not be published. Required fields are marked *