2019-01-25T09:50:14+00:00

Case study on Home Depot Security breach

This paper concentrates on the primary theme of Case study on Home Depot Security breach in which you have to explain and evaluate its intricate aspects in detail. In addition to this, this paper has been reviewed and purchased by most of the students hence; it has been rated 4.8 points on the scale of 5 points. Besides, the price of this paper starts from £ 40. For more details and full access to the paper, please refer to the site.

Case study on Home Depot Security breach

Case study on Home Depot Security breach, attached file, please include:
1. Identification and explanation of the vulnerability(s) exploited.
2. Identification and explanation of the attack vector(s) used.
3. Identification and explanation of the security property(s) compromised.
4. Identification and explanation of the incurred impact.
5. Proposed countermeasure.

Sample paper

Home Depot Security Breach

Identification and explanation of the vulnerability(s) exploited

Home depots as Shelly (para 5) notes has been blamed by most computer security officer for failing to set proper mechanisms in a bid to isolate those sensitive components of their networks which possess the customers information’s and which may be accessible by the outsiders. Interestingly, the company executives believe that much of their fault can be blamed on the fact that the company focused on being in line with the standards focused on security detection rather than focusing setting mechanism to exploit the retailers. The vulnerability has however been noted to have occurred since the was not proactive to vault their customer data in the different compartments of their system.
Identification and explanation of the attack vector(s) used

The hackers would use the credentials from the outside vendors logging on to the systems and by passing any of the barriers set on the third party vendor system heading for the computers network. This they would do by exploiting the vulnerabilities that exist on the Microsoft windows operating system. In each of these instances, the hackers would clear themselves as if they were the company’s executives gaining access to all the points of the systems they wanted to have access to. One of the areas they ventured further……………….


100% Plagiarism Free & Custom Written,
Tailored to your instructions


International House, 12 Constance Street, London, United Kingdom,
E16 2DQ

UK Registered Company # 11483120


100% Pass Guarantee

Order Now

STILL NOT CONVINCED?

We've produced some samples of what you can expect from our Academic Writing Service - these are created by our writers to show you the kind of high-quality work you'll receive. Take a look for yourself!

View Our Samples

FLAT 50% OFF ON EVERY ORDER.Use "FLAT50" as your promo code during checkout