csss5220week_3_article

docx

School

Webster University *

*We aren’t endorsed by this school

Course

5220

Subject

Information Systems

Date

Dec 6, 2023

Type

docx

Pages

2

Uploaded by AdmiralGalaxy8674

Report
The Equifax data breach in September 2017 was a huge cybersecurity incident that exposed the sensitive personal data of millions of Americans. Various flaws contributed to the breach, the most critical of which was a vulnerability in the Apache Struts web application framework. Type of Attack and Attacker Group: A hack used a known vulnerability to trigger the Equifax data breach. Although the identity of the attacker group responsible for this breach has not been established, it has been speculated that the attackers were state-sponsored or organized cyber criminals. Software Name and Vulnerability: A weakness in the Apache Struts web application framework was responsible for the infiltration. The specific vulnerability, CVE-2017-5638, allowed attackers to take arbitrary activities on the affected server by exploiting a flaw in how Struts processed certain requests. Mitigation Actions: The following activities should be considered by organizations: Update and patch software and programs on a regular basis, especially important components such as web application frameworks. Implement robust network security measures like firewalls and intrusion detection/prevention systems. Perform security audits, vulnerability scans, and penetration testing to identify and address any weaknesses. Implement an incident response strategy to detect, contain, and respond to security breaches as quickly as possible. Inform staff on best practices for security, safe browsing habits, and detecting phishing efforts. Security Tools to Detect Software: To identify whether vulnerable software is present in your network environment, utilize vulnerability scanning tools such as Nessus, Qualys, or OpenVAS. These applications may identify software versions and compare them to known flaws. Common Vulnerabilities and Exposures (CVE) Number: The Apache Struts vulnerability in the Equifax incident has been awarded CVE-2017-5638. For several reasons, it is necessary to issue CVE numbers to vulnerabilities: Identification: CVEs are a standardized method of identifying and referencing particular vulnerabilities. Coordination: Security researchers and organizations can utilize CVEs to discuss, exchange information, and coordinate vulnerability responses. Prioritization: IT and security teams may prioritize patching and mitigating measures based on the severity of CVEs. Transparency: CVEs improve security community openness by providing a consistent vocabulary for communicating vulnerabilities and their consequences.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help