logo

Summary of Attack | Computer and Network Security

   

Added on  2022-09-02

7 Pages1353 Words29 Views
Running Head: IT 0
COMPUTER AND
NETWORK SECURITY

IT 1
Table of Contents
Summary of Attack....................................................................................................................2
Exploited Vulnerability..............................................................................................................3
Remedy Action Taken................................................................................................................3
Recommended Future Mitigation Strategy................................................................................4
References..................................................................................................................................6

IT 2
Summary of Attack
The last couple of years has been so well in relation to IT security including of big
recent cyber-attacks having goal to attain access to the targeted system data and disabling
operations. Cyber threats are never static and there are millions being created every year
come from a variety of places, people or contexts (Kitchin, 2014). One such breach occurred
in 2017 where Equifax announced a data breach exposing data of nearly 147 million people
(Tuttle, 2019). With this breach, the information that is affected includes names, home
addresses, mobile numbers, DOB and license number of drivers. In addition, this attack also
impacts stealing of credit card information of nearly 209,000 customers (Williams, 2017).
(Source: warren.senate.gov, 2018)
In extent of severity and scope, the Equifax breach is unprecedented due to the
sensitivity of the individual data detained by the company and the scale of the issue. The
following fallout fumed people further, particularly when the website Equifax has set up
where persons could watch if their data had been compromised appeared mainly planned to
sell the services of company. According to the CEO of SenecaGlobal, Equifax definitely had
the resources, however, it clearly did not have the well culture to ensure the right procedures
were in place and trailed (Fruhlinger, 2018).

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Equifax Data Breach of 2017: Overview, Causes, and Impact | Desklib
|13
|596
|118

IT Security: Equifax Data Breach, Quantum Key Distribution, and Firewall Types
|12
|2997
|59

The Benefits of Risk Management Planning
|12
|2705
|16

Data Breach Equifax
|12
|2129
|319

Data Breaches: Equifax and Sony Playstation Network
|12
|3413
|75

Cybersecurity Threats Assignment
|5
|1057
|121