In the lecture, I talk about three different supply chain co…
In the lecture, I talk about three different supply chain compromise examples. Target was one of those companies which was compromised through its supply chain because it allowed its heating, ventallation, and airconditioning contractor remote access to its systems. Because of this, the threat actors were able to steal millions of customer credit and debit card information during the 2013 holiday shopping season. What was the attack vector for the threat actor to successfully compromise Target?