Securing Organizational Data from Cyber Attack Essay

Total Length: 1464 words ( 5 double-spaced pages)

Total Sources: 3

Page 1 of 5

Diagnosing Cyber Vulnerabilities of Systems that Support an Organization's Supply ChainIntroductionCybersecurity has become a critical concern for organizations of all sizes and industries. With the increasing dependence on technology, cyber threats are becoming more sophisticated and frequent, posing a significant risk to organizations and their customers. In recent years, numerous high-profile cyber breaches have occurred, affecting major corporations and compromising sensitive information. One such example is the Equifax breach that occurred in 2017, which exposed the personal information of nearly 150 million consumers (Wang & Johnson, 2018). This paper will discuss the Equifax cyber breach, the importance of cyber defenses, and applicable government requirements.Background on EquifaxEquifax is one of the largest credit reporting agencies in the world, collecting and storing sensitive information, including social security numbers, birth dates, addresses, and credit card numbers. On September 7, 2017, Equifax announced that it had suffered a massive data breach, affecting nearly 150 million people. The breach was the result of a vulnerability in Equifax's website software, which the company failed to patch in a timely manner.The vulnerability in Equifax's software that allowed for the data breach was a known weakness in the Apache Struts web application framework. Apache Struts is an open-source framework that is widely used to build web applications. In this case, the vulnerability was a result of a flaw in the way that Apache Struts processed user-supplied data. Attackers were able to exploit this vulnerability by sending specially crafted requests to Equifax's web application, which allowed them to execute arbitrary code on the server. This vulnerability had been discovered and patched several months before the breach occurred, but Equifax had failed to apply the patch as soon as possible. As a result, the attackers were able to gain unauthorized access to Equifax's systems and steal sensitive personal and financial information.As a result, cybercriminals were able to access Equifax's systems and steal sensitive information. The sensitive information that was compromised included names, addresses, birth dates, Social Security numbers, and driver's license numbers. In addition, approximately 209,000 individuals had their credit card numbers stolen, and approximately 182,000 had personal dispute documents accessed (Dongre et al., 2019; Wang & Johnson, 2018).The Equifax data breach had significant consequences for both the individuals whose information was compromised and for the company itself. For the individuals affected, the breach resulted in the theft of sensitive personal information that could be used for identity theft or other fraudulent activities (Dongre et al., 2019).

Stuck Writing Your "Securing Organizational Data from Cyber Attack" Essay?

For Equifax, the breach led to numerous lawsuits, investigations, and a significant loss of trust among its customers. In response to the breach, Equifax took several (late) steps to address the issue and prevent similar breaches from happening in the future. These steps included improving its data security systems, and increasing transparency and communication with the public. However, the company faced criticism for its initial response to the breach, which was seen as slow and inadequate. In the wake of the…

[…… parts of this paper are missing, click here to view the entire document ]

…United States, for example, the Federal Trade Commission (FTC) enforces privacy and data security laws, while the Securities and Exchange Commission (SEC) has issued guidance on cybersecurity disclosure. Other countries have similar regulations and standards, including the General Data Protection Regulation (GDPR) in the European Union and the Personal Information Protection and Electronic Documents Act (PIPEDA) in Canada.One requirement in the US that applies directly to the Equifax breach is the Gramm-Leach-Bliley Act (GLBA). This federal law requires financial institutions to protect the confidentiality and security of their customers' personal and financial information. The GLBA applies to Equifax as a credit reporting agency, and the company can be seen as having violated its provisions by failing to adequately protect consumers' personal information (Gaglione, 2019).Overall, organizations should be familiar with the laws and regulations that apply to their industry and should take steps to ensure that they are in compliance with all applicable requirements. This includes having appropriate data security measures in place and having a plan in place for responding to a breach.ConclusionIn conclusion, the Equifax breach serves as a reminder of the importance of cyber defenses for organizations. With the increasing frequency and sophistication of cyber threats, it is essential for organizations to implement robust cybersecurity measures to protect their systems and data. This includes following government regulations and standards, as well as regularly reviewing and updating their cybersecurity policies and procedures. By taking these steps, organizations can reduce the risk of a cyber….....

Show More ⇣


     Open the full completed essay and source list


OR

     Order a one-of-a-kind custom essay on this topic


sample essay writing service

Cite This Resource:

Latest APA Format (6th edition)

Copy Reference
"Securing Organizational Data From Cyber Attack" (2023, February 11) Retrieved May 6, 2024, from
https://www.aceyourpaper.com/essays/securing-organizational-data-cyber-attack-2178152

Latest MLA Format (8th edition)

Copy Reference
"Securing Organizational Data From Cyber Attack" 11 February 2023. Web.6 May. 2024. <
https://www.aceyourpaper.com/essays/securing-organizational-data-cyber-attack-2178152>

Latest Chicago Format (16th edition)

Copy Reference
"Securing Organizational Data From Cyber Attack", 11 February 2023, Accessed.6 May. 2024,
https://www.aceyourpaper.com/essays/securing-organizational-data-cyber-attack-2178152