csss5220week_3_article
docx
keyboard_arrow_up
School
Webster University *
*We aren’t endorsed by this school
Course
5220
Subject
Information Systems
Date
Dec 6, 2023
Type
docx
Pages
2
Uploaded by AdmiralGalaxy8674
The Equifax data breach in September 2017 was a huge cybersecurity incident
that exposed the sensitive personal data of millions of Americans. Various flaws
contributed to the breach, the most critical of which was a vulnerability in the
Apache Struts web application framework.
Type of Attack and Attacker Group:
A hack used a known vulnerability to
trigger the Equifax data breach. Although the identity of the attacker group
responsible for this breach has not been established, it has been speculated that
the attackers were state-sponsored or organized cyber criminals.
Software Name and Vulnerability:
A weakness in the Apache Struts web
application framework was responsible for the infiltration. The specific
vulnerability, CVE-2017-5638, allowed attackers to take arbitrary activities on
the affected server by exploiting a flaw in how Struts processed certain
requests.
Mitigation Actions:
The following activities should be considered by
organizations:
Update and patch software and programs on a regular basis, especially
important components such as web application frameworks.
Implement robust network security measures like firewalls and intrusion
detection/prevention systems.
Perform security audits, vulnerability scans, and penetration testing to
identify and address any weaknesses.
Implement an incident response strategy to detect, contain, and respond
to security breaches as quickly as possible.
Inform staff on best practices for security, safe browsing habits, and
detecting phishing efforts.
Security Tools to Detect Software:
To identify whether vulnerable software is
present in your network environment, utilize vulnerability scanning tools such as
Nessus, Qualys, or OpenVAS. These applications may identify software versions
and compare them to known flaws.
Common Vulnerabilities and Exposures (CVE) Number:
The Apache Struts
vulnerability in the Equifax incident has been awarded CVE-2017-5638. For
several reasons, it is necessary to issue CVE numbers to vulnerabilities:
Identification:
CVEs are a standardized method of identifying and
referencing particular vulnerabilities.
Coordination:
Security researchers and organizations can utilize CVEs to
discuss, exchange information, and coordinate vulnerability responses.
Prioritization:
IT and security teams may prioritize patching and
mitigating measures based on the severity of CVEs.
Transparency:
CVEs improve security community openness by providing
a consistent vocabulary for communicating vulnerabilities and their
consequences.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help