6-2 Case Study Analysis: Preventing FraudReview the Module Six case study, choose either the case from Home Depot or the case from Target, and address the critical elements. To complete this assignmen

IT 380 Module Six Case Study Analysis Guidelines and Rubric Overview: This case study will help you analyze a cyber security scenario and identify which tenets were violated. Each skill in this paper is an essential part of the final project and accompanying milestones in this course. Prompt: Choose either the Home Depot security breach or Target security breach from the articles below. Use the information provided to analyze the cyber security occurrence, determine which principles were violated , and recommend appropriate policies to prevent recurrence. Review the Module Six resources to complete this assignment. After reviewing the details surrounding these two major breaches and the information from Test Out from this module, answer the follow ing questions. Select either the Home Depot breach or Target breach as your exemplar.  Which tenets of cyber security were violated in the breach? How were those attacks executed to bypass network defenses?  What elements of network defense would have helpe d mitigate or prevent the breach?  What elements of data defense would have helped mitigate or prevent the breach?  What best practices would you recommend going forward to better secure the organization —both for overall defense and also to provide better de tection? Based on the Test Out sections from this module and the additional module resource articles that you reviewed, your paper should address the fo llowing critical elements:  Identification of cyber security tenets that were violated and rationale of cause  Analysis of data defense that would have helped mitigate or prevent this breach  Recommendation of best practices to secure organization going forward Rubric Guidelines for Submission: Your paper must be submitted as a 2‐ to 3‐page Microsoft Word d ocument with double spacing, 12‐point Times New Roman font, and one‐inch margins. All academic sources must be cited using the latest APA guidelines. Critical Elements Exemplary (100%) Proficient (90%) Needs Improvement (70%) Not Evident (0%) Value Identification of Violated Cybersecurity Tenets Meets “Proficient” criteria and correctly identifies which tenets were violated, with empirical supporting examples Correctly identifies which tenets were violated with supporting examples Identifies which tenets were violated but supporting examples have gaps Does not identify which tenets were violated 30 Analysis of Data Defense Meets “Proficient” criteria and analysis demonstrates keen insight of data defense and prevention methods Analysis demonstrates accurate knowledge of data defense and prevention methods Analysis demonstrates knowledge of data defense methods but needs additional information to support prevention ideas Does not analyze the data defense and prevention methods 30 Best Practices Recommendation Meets “Proficient” criteria and recommendation demonstrates understanding of industry best practices that would remedy the situation appropriately Recommends industry best practices to ensure proper resolution of scenario Recommends a single best practice to remedy situation but recommendation has gaps in strategic implementation Does not recommend any industry best practices 30 Proper Use of Writing, Mechanics, and Grammar Paper is free of errors in organization and grammar with applicable sources cited Paper is mostly free of errors of organization and grammar; errors are marginal and rarely interrupt the flow; cites applicable sources Paper contains errors of organization and grammar but errors are limited enough so that assignments can be understood; cites applicable sources Paper contains errors of organization and grammar making the content difficult to understand 10 Total 100%