Assignment 8
Tackle as many of these problems as you can, submitting your answers along the way via this Google Form, which should autosave your answers. Be sure to click SUBMIT at the bottom of the Google Form when you have completed the assignment. You should receive an email receipt when the form has been properly submitted. You can resubmit, too, as many times as you’d like before the assignment’s deadline. Refer to these instructions for guidance on submitting.
Please be mindful of the course’s policy on academic honesty as you complete this assignment. When you engage with others regarding this assignment in peer learning sessions, be aware of our guidelines for assignment-related discussions. With the above in mind, the solution for the first item below denoted with an asterisk (*) may be openly discussed without restriction during peer learning sessions.
Not to worry if you run into trouble. Do just attend office hours for help! Further, consult our AI-based tool, cs50.ai.
Getting Started
Read Line Dubé’s Autopsy of a Data Breach for a look at Target’s security breach a few years back.
Question 1*
How did the attackers breach Target’s security?
Question 2
What factors allowed the attack to be successful?
Question 3
Who were all of the stakeholders in this case?
Question 4
For each of those stakeholders, what are the consequences of the breach?