Unit 1 discussion topic 2

.docx

School

Purdue Global University *

*We aren’t endorsed by this school

Course

543

Subject

Information Systems

Date

Dec 6, 2023

Type

docx

Pages

1

Uploaded by tarantinorogers1

Report
Hello Professor and Classmates, One notable breach that stood out to me was the Equifax data breach in 2017. Equifax is one of the three major credit reporting agencies in the United States, and this breach exposed the sensitive personal information of approximately 147 million Americans. The breach was a significant incident with far-reaching consequences, and it serves as an illustrative example of the importance of encryption in preventing such breaches. The Equifax breach was primarily caused by a vulnerability in the Apache Struts web application framework. Equifax failed to apply a patch for a known security vulnerability in Apache Struts on time. Hackers exploited this vulnerability to gain unauthorized access to Equifax’s network. The vulnerability, known as CVE-2017-5638, allowed attackers to execute arbitrary code on the targeted server when exploited [ CITATION Jos20 \l 1033 ]. The breach was a result of Equifax’s failure to promptly apply a security patch for this known vulnerability. Encryption could have prevented the breach. This plays a crucial role in protecting data, both at rest and in transit. In the case of the Equifax breach, the sensitive data should have been encrypted. If Equifax had implemented strong encryption for the sensitive data stored on its servers, it would have made it significantly more challenging for the hackers to access and exfiltrate the data even if they successfully breached the network. Encrypted data, when at rest, is stored in a format that is unreadable without the encryption key. Therefore, even if attackers gained access to the data files, they would not be able to decipher the information without the appropriate encryption key. Proper encryption practices include robust key management. Equifax should have securely managed and stored encryption keys, ensuring that even if attackers gained access to the encrypted data, they would be unable to decrypt it without the keys. Effective key management is crucial for the overall security of encrypted data. References Fruhlinger, J. (2020, Feburary 12). CSO . Retrieved from Equifax data breach FAQ: What happened, who was affected, what was the impact?: https://www.csoonline.com/article/567833/equifax-data-breach-faq-what-happened-who- was-affected-what-was-the-impact.html#:~:text=Investigators%20believe%20that%20the %20first,point%20and%20easy%20to%20exploit.
Discover more documents: Sign up today!
Unlock a world of knowledge! Explore tailored content for a richer learning experience. Here's what you'll get:
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help