Sign In
Not register? Register Now!
Pages:
1 page/β‰ˆ275 words
Sources:
No Sources
Style:
APA
Subject:
Management
Type:
Other (Not Listed)
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 4.32
Topic:

The Equifax Breaches

Other (Not Listed) Instructions:

Read the case study I provided and only answer the question 1 based on three power points I provided. The answer can not exceed one page, single-spaced, font size 12.

Case 4.1The Equifax Breaches - Pages 89-91 Questions:

1. What actions should Equifax have taken to prevent the breaches7 Provide three specific examples in your answer. (7 points 

2.  Place yourself as a victim in the Equifax breaches. What should you do when you are notified (or when you think) that your personal data have been compromised7 What does the Canadian Anti-Fraud Centre advise7 (9 points)

3.  What are the implications for the continued use of social insurance numbers as universa l,unique identifiers7 What is the specific CRA guidance on the use of SIN?

What measures might take the place of social insurance numbers as unique identifiers? (9 points)

Important
Always justify your answers with solid arguments and examples. Base your answers on the concepts covered in the slides and the textbook. You may use external sources if it makes your answers stronger, but you must always reference those sources properly. Avoid copying definitions from the slides or the textbook. Avoid cutting and pasting from online sources. Use point form when appropriate.

Other (Not Listed) Sample Content Preview:

The Equifax Breaches
Your name
Subject and Section
Professor’s Name
June 9, 2023
1 One of the most pivotal actions Equifax should have taken to prevent the breach involves properly addressing known vulnerabilities within its system. In this particular instance, Equifax was remiss in its duty to fix a crucial vulnerability within the Apache Struts web application software, the failure that created a significant weak point within its cyber defenses. Regular updates and patches to all software components form the bedrock of a robust cybersecurity infrastructure (Oka & Hromada, 2022). These measures are not simply best practices but essential steps to secure information systems from increasingly sophisticated cyber threats. Equifax could have markedly reduced the risk of a breach by ensuring that its software is up-to-date and that all known vulnerabilities are addressed promptly.
2 The author believes that the second critical preventive measure Equifax should implement involves encrypting sensitive data. In the aftermath of the Equifax breach, it became evident that sensitive customer data was stored in an unencrypted format. This lack of encryption represented a critical security lapse. Implementing encryption measures for sensitive data at rest and in transit is fundamental to data security. Encryption translates data into a code that c...
Updated on
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

πŸ‘€ Other Visitors are Viewing These APA Other (Not Listed) Samples: