EQUIFAX
read the case (attached) then answers the questions in the instruction
8-13 Identify and describe the security and control weaknesses discussed in this case.
8-14 What management, organization, and technology factors contributed to these problems?
8-15 Discuss the impact of the Equifax hack. 8-16 How can future data breaches like this one be prevented? Explain your answer.
Answer preview
Information systems are increasingly becoming vulnerable to attacks. As technologies advance, the threats facing information systems increase. Hackers are after vulnerabilities in information systems that they can manipulate (Conteh & Schmick, 2016). In the case of Equifax, the attackers took advantage of a vulnerability that was present in software used by the company. Even though a patch for the software was already…
(1000 words)