Home Title Introduction Background Legal & Ethical Security Conclusion Bibliography

From Raids to Recovery
An Analysis of the largest Retail Security Breaches
in the United States

George Mason University
IT 103 Section 222
Fall 2014
By Ignatius Idio


GMU Honor Code Statement:
"By placing this statement on my webpage, I certify that I have read and understand the GMU Honor Code . I am fully aware of the following sections of the Honor Code: Understanding the Honor Code, Understanding the Consequences. In addition, I have received permission from the copyright holder for any copyrighted material that is displayed on my site. This includes quoting extensive amounts of text, any material copied directly from a web page and graphics/pictures that are copyrighted. This project or subject material has not been used in another class by me or any other student. Finally, I certify that this site is not for commercial purposes, which is a violation of the George Mason Responsible Use of Computing (RUC) Policy posted on Policy web site ."

*Author's Note: This research was conducted for the IT 103-011 "Intro to Computing" Lecture Course


Valid XHTML 1.0 Transitional