case study questions 38
10-8. Why did the attackers spear-phish a contractor to target?
10-9. Explain how a third-party contractor could weaken an organizations overall security?
10-10. Describe how data was stolen from Target?
10-11. How might a data loss at one organization affect other organizations
10-12. Explain why large organizations are attractive targets for attackers
10-13. Why might chip and pin cards reduce this type of theft
10-14. Why didn’t target have a CISO before the data breach
attached is the required reading