What policies appear to have been lacking at equifax

Assignment Help Computer Engineering
Reference no: EM132060332

Question: In July of 2017, Equifax suffered a security breach. It is estimated that over 143 million Americans had their birthdate, social security number, addresses and driver's license numbers stolen. In addition, over 206,000 credit card numbers with PII attached were accessed and ~182,000 people involved in credit card disputes. In the latter cases, customers in the UK and Canada were also affected.

It is said that a patch was not applied to the Apache Struts and that vulnerability allowed the hackers to break in. In addition, the breach occurred between May and July of 2017, but was not reported to the public until September after Equifax had hired Mandiant to do an internal investigation of what had happened.

Also three Equifax executives sold off almost US $1.8 Million of their personal shares a month prior to the public disclosures.

Equifax set up a website for people to use equifaxsecurity2017 website which later was classified as insecure and built almost like a phishing website.

Using what we have learned in this class, write a 2 to 3 page paper that addresses:

• What policies and procedures appear to have been lacking at Equifax?

• Do any of the policies and procedures address what the executives are accused of doing?

• Why did they wait so long to inform the public? Legally what are they required to do?

• How could this have been avoided?

State your premise and supporting arguments, etc. clearly.

Reference no: EM132060332

Questions Cloud

Discuss pragmatic humanitarian interventions : Assess Robert Pape's argument for pragmatic humanitarian interventions. Do you think he assesses Libya and Syria about right - in light of any evidence you can.
Discuss the ideas of a selected dance style : Students are expected to use class readings along with outside sources such as online research, movies, books, articles or other sources of their choice.
How to determine the best formatting for particular proposal : Post a very brief memo (100 words or less) that describes how to determine the best formatting for a particular proposal.
Define current trends of information systems infrastructures : Current and future trends of Information systems infrastructure. Please remember this needs to be in your words. No cut and paste, No turning in other's work.
What policies appear to have been lacking at equifax : Equifax set up a website for people to use equifaxsecurity2017 website which later was classified as insecure and built almost like a phishing website.
How it is possible for someone at minitrex to call customer : Explain how it is possible for someone at Minitrex to call a customer and not know (a) that this is a customer and (b) that this is the third time.
Business consideration relating to security policy framework : Please respond to the following prompt: "Discuss business considerations relating to security policy frameworks. When creating a security policy framework.
What sorts of improvements can you imagine : What do you think the keyboard and the mouse (pointing device) of the future will look like? What sorts of improvements can you imagine?
What events might occur to interrupt the utility : Name a utility required by a data center. What events might occur to interrupt this utility? Atleast 400 Words With No Plagarism.

Reviews

Write a Review

Computer Engineering Questions & Answers

  For the sr-nand and sr-nor latches derive

For the SR-NAND and SR-NOR latches derive - Characteristic tables

  Spreadsheet model of the heat transfer situation

Spreadsheet model of the heat transfer situation

  Explain how you would implement the same program in pascal

Explain how you would implement the same program in Pascal. Compare the object-oriented and the procedual solution in terms of maintainability.

  Write program that prints sum of first ten positive integers

Write a program that prints a greeting of your choice, perhaps in a language other than English. Write a program that prints sum of first ten positive integers.

  Describe several points with which you agree or disagree

Explain what you think about the argument. Describe several points with which you agree or disagree. Explain how the passages support your opinion.

  Task1 compile a list of at least four skills that are

task1. compile a list of at least four skills that are listed as essential or desirable from the advertisments you have

  Find out coding of binary information and error detection

find out Coding of Binary Information and Error Detection.

  What is the rule of three and why is it important

What is the difference between a forward_iterator and a bidirectional_iterator? What is the rule of three? Why is it important to follow this rule?

  Express how to use the six steps of the psdlc

Each time you need to play a particular song, you have to manually search through the boxes to find the CD that has the song you need. It has become a habit that as individuals finish playing a CD, they would simply put it in the nearest box.

  Explaining the trust/security domain boundaries

Recognize and explain Trust/Security Domain boundaries which may be applicable to the personal computer (workstation) security in the business context.

  Trace the action of radix sort on the preceding list

Trace the action of radix sort on the preceding list of seven numbers considered as six-digit binary integers.

  What are the two states of a neuron

What does the knowledge representation used in a neural network try to mimic? What is neuron? What are the two states of a neuron?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd