The Target data breach of 2013 was one of the largest data breaches in U.S. history, exposing sensitive data for 40 million debit and credit card accounts from about 2,000 Target stores. Hackers gained access through a vendor, Fazio Mechanical Services, using phishing emails to steal credentials, which allowed access to Target’s systems. Once inside, hackers used malware on Target’s POS systems to capture customer data from card swipes. Despite warnings from cybersecurity firm FireEye, Target’s security team mistakenly dismissed alerts as false positives.
The breach cost Target around $290 million in settlements, lawsuits, and compensation, and resulted in a significant drop in earnings, reputational damage, and leadership turnover. This incident highlighted critical gaps in cybersecurity practices and underscored the importance of proactive security measures and strong vendor management.
Here is a set of 85 multiple-choice questions with answers.
1. What was the immediate cause of the cyber attack on Target?
- A. Malware on POS systems
- B. Phishing emails to Fazio Mechanical Services ✔️
- C. Hackers directly targeting Target's servers
- D. Customer data breach from the online portal
2. Fazio Mechanical Services is related to Target as:
- A. A major customer
- B. A key competitor
- C. A vendor ✔️
- D. An investor
3. How did the hackers gain access to Target’s systems?
- A. Through direct infiltration
- B. By using passwords stolen from Fazio Mechanical Services ✔️
- C. By hacking Target's CEO
- D. Through online purchases
4. Which of the following types of information was stolen in the Target breach?
- A. Social Security Numbers and card details ✔️
- B. Only phone numbers
- C. Medical records
- D. Cryptocurrency wallets
5. Which law addresses the safeguards around personal data in India as of 2023?
- A. Indian Data Protection Act
- B. Digital Personal Data Protection (DPDP) Act 2023 ✔️
- C. Cyber Data Protection Act
- D. Privacy Protection Law 2023
6. The concept of “privacy calculus” refers to:
- A. The trade-off between personal information shared and benefits received ✔️
- B. Government control over social networks
- C. The use of complex passwords
- D. Keeping data localized
7. What penalty can be levied for failing to take reasonable security safeguards under the DPDP Act 2023?
- A. Up to Rs 50 crore
- B. Up to Rs 100 crore
- C. Up to Rs 250 crore ✔️
- D. Unlimited fine
8. Which social media platform is known for privacy issues as noted in the case?
- A. Facebook ✔️
- B. LinkedIn
- C. Snapchat
- D. TikTok
9. Which method did hackers use to collect data from Target’s POS systems?
- A. Phishing
- B. Keylogging
- C. RAM scraping attack ✔️
- D. Social engineering
10. What is a False Positive in cybersecurity?
- A. When an alert indicates a threat that does not exist ✔️
- B. When a real threat goes undetected
- C. When security is compromised by staff error
- D. When malware is mistakenly deleted
11. Why was Target’s security alert from FireEye ignored?
- A. Lack of resources
- B. It was taken as a False Positive ✔️
- C. Hackers disabled alerts
- D. Insufficient staff knowledge
12. Which data breach example exposed 50 million users' personal data?
- A. Big Basket
- B. WhatsApp
- C. Cambridge Analytica ✔️
- D. Snapchat
13. What was one financial impact on Target due to the data breach?
- A. Revenue increased due to publicity
- B. Net income decreased by 50% ✔️
- C. Lawsuits were avoided
- D. Stock price was unaffected
14. What is a primary feature of the DPDP Act?
- A. It only covers non-personal data
- B. It excludes any penalties
- C. It focuses on personal data protection ✔️
- D. It allows unrestricted data storage abroad
15. After the breach, Target’s net income for 2014 dropped to:
- A. $2,999 million
- B. $2,500 million
- C. $1,971 million ✔️
- D. $1,500 million
16. What is data localization as proposed in the draft data protection bill 2022?
- A. Requiring companies to store data locally ✔️
- B. Allowing data transfer only within trusted countries
- C. Centralized data storage on government servers
- D. Free movement of data globally
17. Who founded Target?
- A. George Dayton ✔️
- B. Sam Walton
- C. Richard Target
- D. Bill Gates
18. What was one of the security measures recommended to avoid such cyber-attacks?
- A. Deactivate security alerts
- B. Use two-factor authentication ✔️
- C. Avoid using firewalls
- D. Increase social media outreach
19. What kind of card data was compromised in the Target breach?
- A. Only debit cards
- B. Both debit and credit cards ✔️
- C. Only gift cards
- D. Corporate credit cards only
20. How much data was stolen during the breach?
- A. 5 GB
- B. 10 GB
- C. 11 GB ✔️
- D. 20 GB
21. In 2018, Target ranked ___ on the Fortune 500 list.
- A. 50
- B. 45
- C. 39 ✔️
- D. 30
22. What was the name of the malware used in Target’s POS systems?
- A. Trojan Horse
- B. Citadel ✔️
- C. Ransomware
- D. PhishNet
23. Which action can protect against unauthorized system access?
- A. Saving passwords in the browser
- B. Clearing browser cookies ✔️
- C. Using default passwords
- D. Disabling firewalls
24. Who filed a lawsuit against Target’s board of directors after the breach?
- A. Customers
- B. Shareholders ✔️
- C. Employees
- D. Competitors
25. Which phrase best represents the lesson from Target’s data breach?
- A. Technology alone ensures security
- B. Compliance can replace management
- C. Technology is useless without proper management ✔️
- D. Customer service resolves all issues
26. Target ignored which security warning before the breach?
- A. Website certificate expiration
- B. An alert from FireEye ✔️
- C. Customer complaints
- D. Server error logs
27. Which of the following is NOT a competitor of Target?
- A. Walmart
- B. Best Buy
- C. Kmart
- D. Amazon ✔️
28. What was the total cost Target incurred due to the breach?
- A. $250 million
- B. $162 million
- C. $290 million ✔️
- D. $300 million
29. Which department was primarily affected by lawsuits after the breach?
- A. Sales
- B. Marketing
- C. Security and IT ✔️
- D. Human Resources
30. A critical cybersecurity measure is:
- A. Storing passwords on paper
- B. Using complex passwords ✔️
- C. Removing antivirus software
- D. Avoiding logouts on shared computers
31. What program did Target offer that involved collecting Social Security Numbers (SSNs)?
- A. Loyalty Program
- B. REDCard Program ✔️
- C. Employee Benefits Program
- D. Insurance Program
32. How did hackers initially start their attack on Target?
- A. Installing malware on all Target systems
- B. Infecting a small number of POS systems ✔️
- C. Hacking customer email accounts
- D. Accessing Target’s online store
33. How much did Target pay Visa due to the data breach?
- A. $40 million
- B. $100 million
- C. $67 million ✔️
- D. $80 million
34. How did Target respond to FireEye's alerts on Nov 30 and Dec 2?
- A. They took immediate action
- B. They ignored it, considering it a False Positive ✔️
- C. They filed a police report
- D. They increased security personnel
35. Which of the following describes a RAM scraping attack?
- A. Stealing data stored on servers
- B. Extracting data from the system memory ✔️
- C. Phishing for user credentials
- D. Encrypting data for ransom
36. Target’s REDCard program offered customers:
- A. Loyalty discounts only
- B. Store credit and discounts ✔️
- C. Exclusive products
- D. Points for online purchases
37. The data breach affected how many Target stores?
- A. 1,000 stores
- B. 1,500 stores
- C. 2,000 stores ✔️
- D. 3,000 stores
38. How did the hackers initially gain access to customer data?
- A. By infiltrating email systems
- B. By installing malware in POS systems ✔️
- C. Through a security breach in Target’s website
- D. By manipulating Target’s app
39. Which kind of security software did Fazio use that was unsuitable for corporate use?
- A. Basic anti-malware software ✔️
- B. Two-factor authentication software
- C. High-security firewall
- D. Encrypted VPN service
40. The breach led to approximately how many lawsuits against Target?
- A. 50
- B. 80 ✔️
- C. 100
- D. 150
41. What kind of information was collected from the magnetic strip on POS systems?
- A. Email and phone number
- B. Debit and credit card information ✔️
- C. Social media profiles
- D. Insurance details
42. How much did Target pay MasterCard due to the breach?
- A. $25 million
- B. $50 million
- C. $40 million ✔️
- D. $30 million
43. What did hackers install to capture payment information at Target?
- A. VPN filters
- B. Citadel malware ✔️
- C. Ransomware
- D. Email tracking software
44. In the wake of the breach, Target faced fines due to non-compliance with:
- A. Cybersecurity
- B. Payment Card Industry (PCI) standards ✔️
- C. Tax laws
- D. Employee privacy regulations
45. Target’s security team failed to take action against a warning due to:
- A. Overconfidence in firewall strength
- B. Mistaking it for a False Positive ✔️
- C. Relying on outdated antivirus software
- D. Inadequate employee training
46. What is one of the key recommendations for companies to avoid similar breaches?
- A. Store passwords on shared servers
- B. Implement two-factor authentication ✔️
- C. Disallow any third-party vendors
- D. Store data on local servers only
47. Who lost their jobs at Target following the breach?
- A. CEO and CFO
- B. CEO and CIO ✔️
- C. Board of Directors
- D. Security analysts
48. After the breach, Target faced investigations by:
- A. FBI and CIA
- B. Department of Justice ✔️
- C. International Cyber Crime Agency
- D. Interpol
49. According to the case study, which of the following is true regarding compliance?
- A. Compliance is the only measure needed
- B. Compliance should be supplemented with holistic security measures ✔️
- C. Compliance ensures complete data protection
- D. Compliance does not affect cybersecurity
50. What type of customer service did Target display after the breach?
- A. Exemplary customer service
- B. Poor customer service ✔️
- C. Personalized follow-up with customers
- D. Enhanced customer service standards
51. How many debit and credit card accounts were compromised in the Target data breach?
- A. 20 million
- B. 30 million
- C. 40 million ✔️
- D. 50 million
52. What was the outcome for Target’s net earnings in the fourth quarter after the breach?
- A. Increased by 46%
- B. Decreased by 46% ✔️
- C. Remained stable
- D. Rose significantly
53. What could be a cause of False Positives in cybersecurity?
- A. Incorrect configuration of alerts ✔️
- B. Lack of security measures
- C. Insufficient data storage
- D. Overreliance on management
54. How did shareholders react to the Target breach?
- A. Filed lawsuits against board members and executives ✔️
- B. Increased their shares
- C. Sued competitors
- D. Increased bonuses for executives
55. The data breach cost Target approximately how much in total?
- A. $162 million
- B. $250 million
- C. $290 million ✔️
- D. $350 million
56. The DPDP Act of 2023 mainly focuses on:
- A. Safeguards around non-personal data
- B. Safeguards around personal data only ✔️
- C. Trade agreements with other countries
- D. Social media data privacy
57. What fine amount can be imposed under the DPDP Act, 2023, for failing to prevent personal data breaches?
- A. Rs 100 crore
- B. Rs 200 crore
- C. Rs 250 crore ✔️
- D. Rs 500 crore
58. Which social media platform was involved in the Cambridge Analytica data breach scandal?
- A. Twitter
- B. Facebook ✔️
- C. Instagram
- D. LinkedIn
59. What is the privacy concept that involves users assessing the tradeoff between benefits and risks?
- A. Privacy paradox
- B. Privacy calculus ✔️
- C. Data minimization
- D. Information asymmetry
60. The Target data breach led to how much net income loss from 2013 to 2014?
- A. Increased by 30%
- B. Decreased by 34% ✔️
- C. No change in income
- D. Increased by 15%
61. In which year was Target ranked 39th on the Fortune 500 list by revenue?
- A. 2015
- B. 2018 ✔️
- C. 2010
- D. 2020
62. What type of data was primarily compromised in the Target data breach?
- A. Medical records
- B. Financial data (credit/debit card information) ✔️
- C. Social media data
- D. Employee personal details
63. Which company’s employees unknowingly enabled hackers to gain access to Target’s network?
- A. FireEye
- B. Fazio Mechanical Services ✔️
- C. Visa Inc.
- D. MasterCard Inc.
64. How was Fazio Mechanical Services compromised?
- A. Phishing emails ✔️
- B. Website malware
- C. Password breach
- D. Phone hacking
65. Which of the following was a major competitor of Target in the retail sector?
- A. Sears
- B. Best Buy
- C. Walmart ✔️
- D. Amazon
66. Truecaller is an example of what type of privacy issue?
- A. Location data misuse
- B. Social media privacy
- C. Data sharing and privacy calculus ✔️
- D. Retail data breach
67. What role did the Indian monitoring team (FireEye) play in the Target breach?
- A. Conducted POS audits
- B. Detected the malware and raised an alert ✔️
- C. Managed customer service
- D. Provided sales support
68. Target’s security team turned off which critical security feature during the attack?
- A. Two-factor authentication
- B. Automatic malware deletion ✔️
- C. Biometric logins
- D. Anti-virus software updates
69. Which method is recommended to prevent unauthorized system access?
- A. Store passwords in browsers
- B. Use complex passwords and change them often ✔️
- C. Avoid two-factor authentication
- D. Keep passwords written in a document
70. What was the approximate amount of data (in GB) stolen in the Target breach?
- A. 5 GB
- B. 11 GB ✔️
- C. 20 GB
- D. 30 GB
71. What term is used when a system incorrectly identifies a threat that isn’t actually present?
- A. True Positive
- B. False Positive ✔️
- C. False Negative
- D. True Negative
72. In the Target breach, hackers used a technique that involved collecting data from where?
- A. Encrypted files
- B. RAM of POS systems ✔️
- C. Social media profiles
- D. Employee databases
73. What was Target’s response to customers immediately after the breach?
- A. Comprehensive support and information sharing
- B. Delayed response and incomplete information ✔️
- C. Full compensation to all customers
- D. Outsourced communication to third parties
74. What is "data localization" as proposed in the initial drafts of the data protection bill?
- A. Transferring data to international servers
- B. Storing data within the country’s borders ✔️
- C. Limiting data access to foreign companies
- D. Encrypting all user data
75. Under the DPDP Act, 2023, which data is excluded from the protection requirements?
- A. Financial data
- B. Non-personal data ✔️
- C. Health records
- D. Social Security data
76. Which company faced a major data breach that exposed 50 million users’ personal data?
- A. Big Basket
- B. WhatsApp
- C. Facebook (Cambridge Analytica) ✔️
- D. Target
77. What did Target’s shareholders allege in their lawsuit against the board?
- A. Data was well-protected by Target
- B. The board failed in their duty to protect customer data ✔️
- C. The breach was caused by foreign hackers
- D. Target provided timely breach information
78. How did Target’s data breach impact its quarterly earnings?
- A. Increased by 50%
- B. Dropped by 46% ✔️
- C. No impact on earnings
- D. Increased by 25%
79. Which act requires companies to take reasonable security safeguards to prevent data breaches?
- A. Cybersecurity Act, 2022
- B. Digital Personal Data Protection (DPDP) Act, 2023 ✔️
- C. Data Integrity Act
- D. Digital Freedom Act
80. What type of organization-wise activity is recommended post-breach for risk management?
- A. Daily sales audits
- B. Regular risk management evaluations ✔️
- C. Disabling all security alerts
- D. Customer profiling only
81. What method was initially suggested for data storage in the draft data protection bill of 2022?
- A. Data encryption only
- B. Data localization ✔️
- C. Monthly audits
- D. Third-party verification
82. Following the breach, Target was also subject to fines for failing to meet:
- A. Financial reporting standards
- B. PCI compliance standards ✔️
- C. International tax regulations
- D. Marketing ethics standards
83. Who among Target’s executives resigned due to the data breach?
- A. CFO and COO
- B. CEO and CIO ✔️
- C. Marketing head and security chief
- D. Operations manager and customer relations head
84. What key lesson did the Target data breach highlight for businesses?
- A. Compliance alone is sufficient for data protection
- B. Holistic security and active management are essential ✔️
- C. Data protection is optional for retail businesses
- D. Cybersecurity is only for technology companies
85. Which popular retail season did the hackers exploit to target POS systems?
- A. Summer sales
- B. Holiday shopping season ✔️
- C. Back-to-school sales
- D. Black Friday only