In addition to the Case Analysis be sure to answer the following questions given for the case.Your responses must be complete, using terminology and concepts presented in the primary textbook as well as supplementary resources. You must read and follow the Case Submittal
Format file found in the course resources area. Please double-space, use 12 point font, with one inch margins. Be sure to cite your resources and provide the references using APA 6th ed. format.format. Remember to reference all work cited or quoted by the text authors. You should be doing this often in your responses.Using the Graduate Case Study Format found in the attached document review the case using the Graduate Case Study Formatto structure a comprehensive analysis, and answer the questions at the end of the case.The case study must consist of seven sections and include Introduction, Analysis, Solution, Justification, Summary, Discussion Questions, and References.
Discussion Questions
1.How did the hackers steal Target’s customer data?
2.What types of technology could big retailers use to prevent identity thieves from stealing information?
3.What can organizations do to protect themselves from hackers looking to steal account data?
4.In a team, research the Internet and find the best ways to protect yourself from identity theft.Special Require