CIS5205 Management of Information Security Assignment

Assignment Help Other Subject
Reference no: EM132629529

CIS5205 Management of Information Security Assignment - University of the Sunshine Coast, Australia

Assignment - Security Incident Response Report - EQUINOX Data Breach

This assignment assesses your understanding in relation to these course objectives:

1. Analyse information security vulnerabilities, attacks and threats and determine appropriate security architecture, design and controls that can be applied to mitigate the potential risks;

2. Describe the role of disaster recovery and business continuity plans in recovering information and operational systems when systems and hardware fail.

3. Communicate effectively both written and orally about the management of information security in organisations.

Assignment - Case Study: Equifax Data Breach

You are a senior Cyber Security Consultant at HackStop Pty Ltd commissioned to conduct a critical assessment of the data breach at Equifax and prepare a Security Incident Response Report for Senior Management at Equifax.

Equifax Data Breach: Much has been written (and will continue to be written!) about the Equifax security incident. Labelled the largest corporate data breach in history, when Equifax notified of the breach in early September 2017 it immediately hit the headlines and has since continued to garner a lot of attention. The breach: Between mid-May and July 2017 hackers accessed data held by Equifax through a publicised vulnerability in a web application, for which there was a well-known patch available. Data involved in the breach included Social Security numbers, birth dates, addresses, some driver's license numbers, and about 209,000 credit card numbers. A hundred and eighty-two thousand "dispute documents," essentially complaint submissions that include personal identifying data, were also compromised in the breach.

Time between detection and notice: Apparently 6 weeks elapsed between the time the breach was discovered and notification being made by Equifax. Was this too long given the gravity of the breach? This will certainly be one of the key issues that will be examined in the coming months.

It may be that Equifax knew about the breach for more than 6 weeks. Visa and MasterCard also sent confidential alerts to financial institutions across the United States, warning them about more than 200,000 credit cards that were stolen in the epic data breach. It was reported that these alerts appeared to suggest that hackers were first able to steal credit card numbers from Equifax starting in November 2016. But Equifax says the accounts were all stolen at the same time: when hackers accessed the company's systems in mid-May 2017.

Task 1 Provide an overview of the Equifax Data Breach (1) what type of organisation is Equifax (2) when did the data breach occur and (3) type of data involved and the extent/scale of the data breach (1000 words)

Task 2 Describe how and why the Equifax data breach occurred emphasising the failure of technical and governance controls that contributed to this data breach occurring (1000 words)

Task 3 Based on a critical analysis of the Equifax Data Breach, discuss what needs to be done to improve the security of Equifax's computer systems and networks so a data breach on a such a scale never occurs again at Equifax in a set of well thought out and sensible recommendations drawing on lessons learnt from this data breach structured as (a) prevention, (b) detection and (c) response drawing on best security practice and standards (750 words)

Assignment Security Incident Response Report structure-

Cover page

Executive Summary (250 Words)

Table of Contents

Tasks 1-3 as main headings with sub sections/tasks where relevant

References and Appendices

Attachment:- Management of Information Security Assignment File.rar

Reference no: EM132629529

Questions Cloud

Describe specific learning goals and objectives : What are your upcoming week's specific learning goals and objectives? What is your upcoming week's detailed schedule at your community practice experience.
Define role of the ethics committee in health care system : Write a paper describing on ethic Dilemma and the role of the ethics committee in the health care system. Use the APA style and send it via Blackboard.
What codes are assigned for this case : What codes are assigned for this case - While in the hospital he also received his regular preventive infusion of clotting factors
What information needed to make informed strategic decisions : Provide a brief overview of the product for which you are going to write your Marketing Plan. Why did you choose it? Which elements of the plan are you having.
CIS5205 Management of Information Security Assignment : CIS5205 Management of Information Security Assignment Help and Solution - University of the Sunshine Coast, Australia - Assessment Writing Service
Design a marketing strategy based upon your objectives : Design a marketing strategy based upon your objectives. Create an appropriate integrated marketing mix, which will include your ability to effectively appeal.
Find issues in workplace that involve employment law : Should a general managers and HR managers should respond differently to issues in the workplace that involve employment law? Why or why not?
Procedures relate to the operational plan : Explain how strategic plan and organisational policies and procedures relate to the operational plan
What is the revised break-even point : A manufacturer produces three types of humidifiers. The retail price of Humidifier Regular (HR) is $60 with variable costs of $20. Humidifier Advanced (HA) sell

Reviews

Write a Review

Other Subject Questions & Answers

  What do you foresee as the obstacles you will face

What do you foresee as the obstacles you will face? How will you handle potential conflicts that arise when implementing change toward becoming a learning organization?

  Develop a program budget request to be implemented

Illustrate the roles of a leader vs. manager within a public safety organization and how that may impact the budgeting process.

  How would you incorporate the information in working

He may experience mood swings and have a history of psychosomatic complaints. He is highly emotional and becomes easily frustrated.

  Explain the four signifcant components of classical

define the 4 important components of classical conditioning ucs cs ucr cr. then provide an example of a classical

  Describe jeannines level of lethality

Jeannine and Robert have been together for five years and have been married for the past three years. They live in an apartment together.

  Explain what recent developments in world trade have made

According to Ferry, what recent developments in world trade have made it urgent for France to have colonies. What arguments against imperialism have been raised by Ferry's critics. How does he counter them

  Characteristics of service operations

What are the characteristics of service operations?

  Difference between nursing conceptual model and theory

Discuss the difference between a nursing conceptual model and a nursing theory. Provide an example in nursing practice where the nursing theory you selected

  The digital origins of dictatorship and democracy

With regard to digital copyrights, which of the following is not considered a derivative work?

  Create a hypothesis for the happiness and engagement dataset

Create a hypothesis for the Happiness and Engagement Dataset from Part 1 of the Statistics Project. Your hypothesis can be anything based on the variables.

  Health issue-heart failure

Outcome indicators that have been developed and utilized to measure progress on the issue?

  Professional it practice and ethics

Professional IT Practice and Ethics Assignment help and solution, School of ENGINEERING, CONSTRUCTION AND DESIGN - Identify a real or imagined Case Study

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd