Wednesday, 3 February 2021

Point-of-Sale (POS) Attacks

 

Point-of-Sale (POS) Attacks

 

  • Point-of-Sale (POS) Attacks

    Overview

    Suppose you are an information security officer for a consulting firm that implements, secures, investigates, and supports POS for small and medium retail businesses.

    Read the article If You Shopped at These 16 Stores in the Last Year, Your Data Might Have Been Stolen. Choose two stores from the list and use the Strayer University Library to research the specific attack or breach.

    Instructions

    Write a 3–5 page paper in which you:

    1. Summarize the selected attacks, providing details on the breaches' effects.
    2. Identify the common purpose of attacks on POS systems.
    3. Assess how and why these POS systems have become a prime target for hacking groups.
    4. Examine the forensics challenges that exist for investigations on POS systems.
    5. Integrate into the assignment at least three quality professional and/or academic resources, written within the past five years.
    6. Note: Wikipedia and similar websites do not qualify as quality resources.
      • One of your resources may be the provided article.

    Formatting

    This course requires the use of Strayer Writing Standards. For assistance and information, please refer to the Strayer Writing Standards link in the left-hand menu of your course. Check with your professor for any additional instructions. Note the following:

      • The preferred method is for your paper to be typed, double-spaced, using Times New Roman font (size 12), with one-inch margins on all sides.










  • Include a cover page containing the assignment title, your name, your professor's name, the course title, and the date. The cover page is not included in the required page length.
  •  
  • Include a source list page. Citations and references must follow SWS format. The source list page is not included in the required page length.
  • Learning Outcomes

    The specific course learning outcome associated with this assignment is:

    • Assess the forensics challenges that exist for investigations.
  •  

No comments:

Post a Comment

Note: only a member of this blog may post a comment.

FIN 317 Financing an Expansion Assignment

  FIN 317 Financing an Expansion Assignment   Financing an Expansion Overview After 12 years, your business is wildly successful, with multi...