Several surprising findings were revealed in the wake of the Target breach, providing a cautionary tale for all executives and security professionals. Which of the following was ***not*** thought to have occurred during the Target security breach?
Responses
* Credit card databases were on entirely separate systems, not connected to other parts of the firm’s information system, but wireless networking allowed hackers to access anything reachable from a cell phone connection.
* Target had properly installed and configured its security software, but hackers got in anyway.
* Target had security software and paid close attention to the notification alerts from the software.
* Target regularly monitored file names and matched them to file sizes and archival copies to ensure that software was not installed on their systems using the names of legitimate products, but hackers saved files with blank file names so they wouldn’t be detected.