GBA 327 SLU Hitting the Target Case Study

10-8. Why did the attackers spear-phish a contractor to target?10-9. Explain how a third-party contractor could weaken an organizations overall security?10-10. Describe how data was stolen from Target?10-11. How might a data loss at one organization affect other organizations10-12. Explain why large organizations are attractive targets for attackers10-13. Why might chip and pin cards reduce this type of theft10-14. Why didn’t target have a CISO before the data breachattached is the required reading