{"id":15382,"date":"2024-03-15T14:10:30","date_gmt":"2024-03-15T14:10:30","guid":{"rendered":"https:\/\/www.writemyessays.app\/blog\/questions\/compare-and-contrast-these-two-hacking-incidents-the-2013-target-credit-card-hack-and-the-2014-sony-pictures-hack\/"},"modified":"2024-03-15T14:10:30","modified_gmt":"2024-03-15T14:10:30","slug":"compare-and-contrast-these-two-hacking-incidents-the-2013-target-credit-card-hack-and-the-2014-sony-pictures-hack","status":"publish","type":"questions","link":"https:\/\/www.writemyessays.app\/blog\/questions\/compare-and-contrast-these-two-hacking-incidents-the-2013-target-credit-card-hack-and-the-2014-sony-pictures-hack\/","title":{"rendered":"Compare and contrast these two hacking incidents: The 2013 Target credit card hack and The 2014 Sony Pictures hack"},"content":{"rendered":"<div style=\"margin-bottom: 1em; font-size: 13.3333px; cursor: auto; color: inherit;\">Instructor&#8217;s prompt:<\/div>\n<div style=\"margin-bottom: 1em; font-size: 13.3333px; cursor: auto; color: inherit;\">Compare and contrast these two hacking incidents:<\/div>\n<ol style=\"margin-top: 1em; margin-right: 0px; margin-left: 0px; padding: 0px 0px 0px 40px; font-size: 13.3333px; cursor: auto; color: inherit;\">\n<li style=\"font-weight: inherit; cursor: auto; color: inherit;\">The 2013 Target credit card hack resulted in up to 70 million credit card accounts being exposed.&nbsp;<\/li>\n<li style=\"font-weight: inherit; cursor: auto; color: inherit;\">The 2014 Sony Pictures hack crippled the company\u2019s network, compromised Sony\u2019s intellectual property and resulted in large volumes of private company correspondence exposed.<\/li>\n<\/ol>\n<div style=\"margin-bottom: 1em; font-size: 13.3333px; cursor: auto; color: inherit;\">The paper will be no less than 12 double-spaced pages (not including a cover page or APA citations) with one-inch margins. There are numerous professional websites that offer detailed information regarding this subject; students should strive to use only verifiable information from quality sources. The student should provide a citation for each factual statement provided and should use no less than ten unique sources for the paper.<\/div>\n<div style=\"margin-bottom: 1em; font-size: 13.3333px; cursor: auto; color: inherit;\">Things to consider:<br style=\"cursor: auto; color: inherit;\"><br style=\"cursor: auto; color: inherit;\">Who were the hackers?<br style=\"cursor: auto; color: inherit;\">What were the hackers\u2019 motivations?<br style=\"cursor: auto; color: inherit;\">What strategies did the hackers use?<br style=\"cursor: auto; color: inherit;\">What vulnerabilities did they exploit?<br style=\"cursor: auto; color: inherit;\">How well prepared were Target and Sony for an attack?<br style=\"cursor: auto; color: inherit;\">Did either company fail to invest in network defenses?<br style=\"cursor: auto; color: inherit;\">What data did each company try to defend the most?<br style=\"cursor: auto; color: inherit;\">How did each company respond to the attacks?<br style=\"cursor: auto; color: inherit;\">Had these companies been attacked before?<br style=\"cursor: auto; color: inherit;\">What was the damage to each company?<br style=\"cursor: auto; color: inherit;\">Were these companies bound by any federal regulations?<br style=\"cursor: auto; color: inherit;\">Do either of these attacks amount to national security threats?<br style=\"cursor: auto; color: inherit;\"><br style=\"cursor: auto; color: inherit;\">Conclude the paper by stating whether the federal government should be involved in actively defending private for-profit companies like Target and Sony.<br style=\"cursor: auto; color: inherit;\"><br style=\"cursor: auto; color: inherit;\">Use as many sources as necessary to fully support your comparison of these incidents.<\/div>\n<div style=\"margin-bottom: 1em; font-size: 13.3333px; cursor: auto; color: inherit;\"><span style=\"font-weight: inherit; font-size: small; line-height: 13.39px; cursor: auto; color: inherit;\"><span style=\"font-weight: inherit; font-size: 13px; cursor: auto; color: inherit;\">Remember, this paper is worth 20% of your final grade.<\/span><\/span><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Instructor&#8217;s prompt: Compare and contrast these two hacking incidents: The 2013 Target credit card hack resulted in up to 70 million credit card accounts being exposed.&nbsp; The 2014 Sony Pictures hack crippled the company\u2019s network, compromised Sony\u2019s intellectual property and resulted in large volumes of private company correspondence exposed. The paper will be no less [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","template":"","meta":[],"disciplines":[62],"paper_types":[],"tagged":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/questions\/15382"}],"collection":[{"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/questions"}],"about":[{"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/types\/questions"}],"author":[{"embeddable":true,"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/comments?post=15382"}],"version-history":[{"count":0,"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/questions\/15382\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/media?parent=15382"}],"wp:term":[{"taxonomy":"disciplines","embeddable":true,"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/disciplines?post=15382"},{"taxonomy":"paper_types","embeddable":true,"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/paper_types?post=15382"},{"taxonomy":"tagged","embeddable":true,"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/tagged?post=15382"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}