What policies appear to have been lacking at equifax

Assignment Help Computer Engineering
Reference no: EM132060332

Question: In July of 2017, Equifax suffered a security breach. It is estimated that over 143 million Americans had their birthdate, social security number, addresses and driver's license numbers stolen. In addition, over 206,000 credit card numbers with PII attached were accessed and ~182,000 people involved in credit card disputes. In the latter cases, customers in the UK and Canada were also affected.

It is said that a patch was not applied to the Apache Struts and that vulnerability allowed the hackers to break in. In addition, the breach occurred between May and July of 2017, but was not reported to the public until September after Equifax had hired Mandiant to do an internal investigation of what had happened.

Also three Equifax executives sold off almost US $1.8 Million of their personal shares a month prior to the public disclosures.

Equifax set up a website for people to use equifaxsecurity2017 website which later was classified as insecure and built almost like a phishing website.

Using what we have learned in this class, write a 2 to 3 page paper that addresses:

• What policies and procedures appear to have been lacking at Equifax?

• Do any of the policies and procedures address what the executives are accused of doing?

• Why did they wait so long to inform the public? Legally what are they required to do?

• How could this have been avoided?

State your premise and supporting arguments, etc. clearly.

Reference no: EM132060332

Questions Cloud

Discuss pragmatic humanitarian interventions : Assess Robert Pape's argument for pragmatic humanitarian interventions. Do you think he assesses Libya and Syria about right - in light of any evidence you can.
Discuss the ideas of a selected dance style : Students are expected to use class readings along with outside sources such as online research, movies, books, articles or other sources of their choice.
How to determine the best formatting for particular proposal : Post a very brief memo (100 words or less) that describes how to determine the best formatting for a particular proposal.
Define current trends of information systems infrastructures : Current and future trends of Information systems infrastructure. Please remember this needs to be in your words. No cut and paste, No turning in other's work.
What policies appear to have been lacking at equifax : Equifax set up a website for people to use equifaxsecurity2017 website which later was classified as insecure and built almost like a phishing website.
How it is possible for someone at minitrex to call customer : Explain how it is possible for someone at Minitrex to call a customer and not know (a) that this is a customer and (b) that this is the third time.
Business consideration relating to security policy framework : Please respond to the following prompt: "Discuss business considerations relating to security policy frameworks. When creating a security policy framework.
What sorts of improvements can you imagine : What do you think the keyboard and the mouse (pointing device) of the future will look like? What sorts of improvements can you imagine?
What events might occur to interrupt the utility : Name a utility required by a data center. What events might occur to interrupt this utility? Atleast 400 Words With No Plagarism.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd