Heartland Breach, assignment help
Read the article titled, “Update: Heartland breach shows whycompliance is not enough” located at the following Computerworld link: http://www.computerworld.com/s/article/9143158/Update_Heartland_breach_shows_why_compliance_is_not_enough Write a two to three (2-3) page paper in which you:Explainwhether you believe adherence of regulations such as PCI are enough toprotect a company from these types of breaches and why or why not.Giveyour opinion on whether companies should formulate security controlsbased on anti-cybercrime techniques, such as end-to-end encryption, orthose based purely complying with industry regulations. Provide arationale with your response.Suggest at least three (3)additional security controls and techniques based on the Heartland andsimilar breaches such as TJX. Provide an explanation for yoursuggestions.Determine the types of monitoring that could beimplemented to help quickly identify penetrations and hurdle the“point-in-time” security protections that regulations, such as PCI,provides.Use at least two (2) quality resources in thisassignment other than the one linked above. Note: Wikipedia and similarWebsites do not qualify as quality resources. Your assignment must follow these formatting requirements:Betyped, double spaced, using Times New Roman font (size 12), withone-inch margins on all sides; citations and references must follow APAor school-specific format. Check with your professor for any additionalinstructions.Include a cover page containing the title of theassignment, the student’s name, the professor’s name, the course title,and the date. The cover page and the reference page are not included inthe required assignment page length. The specific course learning outcomes associated with this assignment are:Identify common information-gathering tools and techniques.Explain the process of network traffic analysis and sniffing and their appropriate tools.Compare and contrast defensive technologies.Use technology and information resources to research issues in cybercrime techniques and response.Writeclearly and concisely about topics related to cybercrime techniques andresponse using proper writing mechanics and technical styleconventions.
THIS QUESTION IS UNSOLVED!
Request a custom answer for this question