What significant ethical harms are involved in equifax case

Assignment Help Basic Computer Science
Reference no: EM133116595

In the summer of 2017, it was revealed that Equifax, a massive credit reporting bureau managing the credit rating and personally-identifying information of most credit-using Americans, had suffered a severe security breach affecting 143 million Americans. Among the data stolen in the breach were social security and credit card numbers, birthdates, addresses, and information related to credit disputes. The scale and severity of the breach was nearly unprecedented, and to make things worse, Equifax's conduct before and after the announcement of the breach came under criticism.

For example, the website created by a public relations consulting firm to handle consumer inquiries about the breach was itself riddled with security flaws, despite requesting customers to submit personally-identifying information to check to see if they were affected. The site also told consumers that by using the site to see if they were affected, they were waiving legal rights to sue Equifax for damages related to the breach. The site, which gave many users inconsistent and unclear information about their status in the breach offered to sell consumers further protection services from Equifax, for a fee.

Soon it was learned that Equifax had known of the May 2017 breach for several months before disclosing it. Additionally, the vulnerability the attackers exploited had been discovered by Equifax's software supplier earlier that year; that company provided had been discovered customers in March 2017. Thus, Equifax had been notified of the vulnerability, and given the opportunity to patch its systems, two months before the breach exposed 100 million Americans to identity theft and grievous financial harm.

Later, security researchers investigating the general quality of Equifax's cybersecurity efforts discovered that on at least one of Equifax's systems in Argentina, an unsecured network was allowing logins with the eminently guessable admin/admin combination of username and password, and giving intruders ready access to sensitive data including 14,000 unencrypted employee usernames, passwords, and national ID numbers.

Following the massive breach, two high-ranking Equifax executives charged with information security immediately retired, and the Federal Trade Commission launched an investigation of the Equifax for the breach. After learning that three other Equifax executives had sold almost two billion dollars of their company stock before the public announcement of the breach, the Department of Justice opened an investigation into the possibility of insider trading related to the executive's prior knowledge of the breach.

Case Questions

What significant ethical harms are involved in the Equifax case, both in the short-term and the long-term? Who are some of the different stakeholders who may be harmed, and how?

What do you imagine might be some of the causes of Equifax's failure to adopt more stringent cybersecurity protections and a more effective incident response? Consider not just the actions of individuals, but also the larger organizational structure, culture, and incentives.

If you were hired to advise another major credit bureau on their information security, in light of the Equifax disaster, what are three questions you might first ask about your cybersecurity practices and their ethical values in relation to cybersecurity? Why?

In what ways could an organizational culture of thinking about the ethics of cybersecurity potentially have presented the Equifax breach or reduced its harmful impact?

Reference no: EM133116595

Questions Cloud

What is the value of her investment assets : She has recently purchased a mutual fund worth $5,200 and she has a retirement account worth $39,000. What is the value of her investment assets
Differences between a company actual value : Explain in detail the common parts and the differences between a company's actual value and its book or liquidation value attributed to going-concern value.
Loan with bad credit and no co signer : Can some one refinance a fed student loan with a private student loan with bad credit and no co signer?
What is the approximate total finance charge you will pay : You get your credit card bill at the end of the month. What is the approximate total finance charge you will pay on this cash advance for the month
What significant ethical harms are involved in equifax case : What significant ethical harms are involved in the Equifax case, both in the short-term and the long-term?
What is the liquidity premium for year 2 : If the liquidity premium theory of the term structure of interest rates holds, what is the liquidity premium for year 2?
Build your own mini eliza chatbot : Build your own mini Eliza through a step-by-step tutorial from Hour of Code and then design and build your own ICT112 chatbot
Estimate the current ratio and the quick ratio : The following items are reported on a company's balance sheet: Cash $377,600. Estimate the current ratio and the quick ratio
Cybersecurity and the public good : Why is cybersecurity an ethically significant public good? Identify at least 2 cybersecurity ethical best practices an organization should carry out and how.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd