Chat with us, powered by LiveChat Suppose you are an information security officer for a consulting firm that implements, secures, investigates, and supports POS for small and medium r - EssayAbode

Suppose you are an information security officer for a consulting firm that implements, secures, investigates, and supports POS for small and medium r

Suppose you are an information security officer for a consulting firm that implements, secures, investigates, and supports POS for small and medium retail businesses.

Read the article  If You Shopped at These 16 Stores in the Last Year, Your Data Might Have Been Stolen https://www.businessinsider.com/data-breaches-2018-4  Choose two stores from the list and research the specific attack or breach.

Answer the questions

Summarize the selected attacks, providing details on the breaches' effects.
Identify the common purpose of attacks on POS systems.
Assess how and why these POS systems have become a prime target for hacking groups.
Examine the forensics challenges that exist for investigations on POS systems.

use three resources

    Related Tags

    Academic APA Assignment Business Capstone College Conclusion Course Day Discussion Double Spaced Essay English Finance General Graduate History Information Justify Literature Management Market Masters Math Minimum MLA Nursing Organizational Outline Pages Paper Presentation Questions Questionnaire Reference Response Response School Subject Slides Sources Student Support Times New Roman Title Topics Word Write Writing