Massive Equifax Data Breach

Decent Essays
This week I was thinking and reading about the massive Equifax data breach that took place this year. Equifax is one of America's 3 main credit reporting agencies. Big data is a threat in today's world. A lot of personal information is collected and stored nowadays, which is used for good reasons but could also be abused. Big data and all new technologies such as artificial intelligence, and machine learning are very powerful and can reform peoples lives in today's times.

Equifax suffered a major data breach and exposed personal details such as Social Security numbers, addresses, credit card numbers of about 143 million people.The thing that shocked me the most was that the vulnerability or bug that the hackers attached had a patch long before

Related Documents

  • Improved Essays

    Target Breach Case Study

    • 675 Words
    • 3 Pages

    Our group decided to discuss the Target breach. This breach occurred in 2013 when they stated hackers broke into the retailer’s network using login credentials stolen from a heating, ventilation and air conditioning company that does work for Target at a number of locations. This company called Fazio had access rights to Target’s network for carrying out tasks like remotely monitoring energy consumption and temperatures at various stores. The attackers leveraged the access provided by the Fazio credentials to move around undetected on Target’s network and upload malware programs on the company’s point of sale systems. The hackers first tested the date-stealing malware on a small number of cash registers.…

    • 675 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Target Security Breach

    • 181 Words
    • 1 Pages

    From a managerial perspective, there were many errors made in handling the December 2013 Target security breach. The first questionable decision for review deals with the effects of poor communication. Chief Executive Gregg Steinhafel hesitates to publicly communicate the breach to consumers (Kinicki & Williams, 2013). The primary law of business is “being responsive to customers” (Kinicki & Williams, 2013, p.12). Furthermore, when the details were communicated, CEO Steinhafel inflated the amount of affected shoppers (Kinicki & Williams, 2013).…

    • 181 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    9/11 Cons

    • 591 Words
    • 3 Pages

    Massive amounts of data being collected are causing extremely high risks of identity theft. When…

    • 591 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Target Breach

    • 1769 Words
    • 8 Pages

    Since then, it seems like data breaches happen every day. It is sad that I do not even remember the Anthem breach. It just blends in with all the others. Between November 27th and December 15th of 2013 Target experienced one of the largest cyber hacks in United States history (Clark, 2014).…

    • 1769 Words
    • 8 Pages
    Improved Essays
  • Improved Essays

    Cookie-Cutter Strategies

    • 384 Words
    • 2 Pages

    There is no silver bullet that will transform student retention rates in a few days. Student success will happen over time, not overnight. We cannot dismiss the urgency of the moment. We must be fully committed to perform every function, take advantage of every opportunity, and be accountable for every responsibility so that student success becomes a reality. Academic institutions have developed best practices that we can follow.…

    • 384 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Technology has shaped many parts of our lifestyle’s from movement from one point to another (GPS), all the way to maintaining all of our hard earned funds on a piece of plastic. The question at hand is how this is all protected and who enforces it? Network security has proven beneficial in many cases in today’s society. It continuously monitors the companies system ensuring that unauthorized access isn’t permitted, or as we like to believe keeping our information from falling into the wrong hands.…

    • 397 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    The events of September 11, 2001 will never be forgotten by the American people. One of the largest changes made in the United States after 9/11 was the introduction of the USA Patriot Act on October 26, 2001. The act allows US government agencies to easily gain access to the private records of people within the United States. The records include phone records, banking statements, and credit reports. Without any limits on the power of government agencies, the possibility of infringing on the rights of private citizens arises.…

    • 564 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Target Breach Case Study

    • 740 Words
    • 3 Pages

    Missed Alarms and 40 Million Stolen Credit Card Numbers: How Target Blew It 1. Who are the stakeholders in the Target breach? The main stakeholders are their shareholders, the clients that had their personal information stolen, and individuals with an ongoing connection with Target organization whose personal information was or might have been compromised. Stakeholders who are affected or worried that they might be harmed start to mistrust the firm and its complacent-sounding promises.…

    • 740 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    While many deem technology as oppressive and intrusive, it has completely reshaped our society in many positive ways. Singer presents the question on whether our technology will liberate us from our oppressive government. Although technology does possess negative advantages, it contains positive ones as well. For instance, in the article, The Terrorist in the Data, the French police were able to utilize the vital aspects of data and surveillance to locate the suspects in the terrorist attack that occurred in Paris in 2015. It is these events where the use of technology comes into vital play.…

    • 1456 Words
    • 6 Pages
    Improved Essays
  • Great Essays

    With the continuing development of the Internet, the center stage of individual, business, and government discussions became a new globally sought after resource, data. Since its origin, Internet users have been warned about the dangers of posting personal, intimate information publicly; however, recent events have shifted privacy discussions away from discouraging posting ill-advised information to bringing awareness to under the radar data collection. Data is a very broad term that encompasses almost all Internet activity. What users search, click, view, and type is all collected and processed by either the website, Internet browser, or even the device itself. The demand for this personal data is enormous.…

    • 1224 Words
    • 5 Pages
    Great Essays
  • Improved Essays

    There’s A Reason Why Mama Wouldn’t Let You Take a Cookie from the Jar: A Rhetorical Analysis of “Six Provocations for Big Data” In their essay “Six Provocations for Big Data”, danah boyd and Kate Crawford argue if the use of Big Data is ethical based upon the fact that is easily accessible to all, especially in today’s society. boyd, a researcher “and [the] founder of Data & Society Research Institute”, and Kate Crawford, also a researcher and professor, attempt to reach an uninformed, nonbiased audience (754). Through their writings, they bring to light the definition of Big Data, where it comes from, how it is used, and how it will affect the future of technology and privacy. Respectively, boyd and Crawford’s effort to persuade the audience…

    • 846 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    Amazon Research Paper

    • 1604 Words
    • 7 Pages

    Has big data improved amazon as a company Introduction This research paper will focus on answering the question “ Has big data improved amazon as a company?” The objectives of this assignment is to examine why the timeline of amazon is relevant to big data. An additional objective is to explore whether amazon have met the needs of its customers through e-commerce and whether the technology in place can be deemed beneficial to the company. An additional objective is to determine if any ethical or security issues are involved.…

    • 1604 Words
    • 7 Pages
    Superior Essays
  • Improved Essays

    I conclude that the overall results of the total data records breached means that if more than one organization has all our sensitive information such as our full names, social security numbers, date of birth, credit card numbers, and etc. then we are more likely have a higher risk of getting exposed more than once if the organization’s database is maliciously attacked. To continually increase awareness in data breach protection best practices will help Businesses and other organizations to lower the risk and minimize the impact of data breach in the future as technology continues…

    • 952 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    For instance, even reaching as far back as 1978, several doctors have found a connection between educated individuals and levels of acceptance toward homosexuals. (Irwin, P, Thompson, N. L. (1978). This is one example of how the Internet has benefited society as a whole. Alternatively, it is often argued that with digitalisation, our privacy is somewhat in question, Ashford, W. (2016, May 18). The rise of “Whistleblowers” Like Julian Assange and Edward Snowden raise questions as to whether there is a general distrust in the population of intelligence agencies or whether a few self-righteous do-gooders have decided to play messiah.…

    • 1516 Words
    • 7 Pages
    Superior Essays
  • Superior Essays

    For example, as Obama is describing how 9/11 produce the issue that encounters how the U.S can defend the nation while ensuring people their civil liberties, he states, “Digital information and powerful supercomputers offers intelligence agencies the possibility of sifting through massive amounts of bulk data to identify patterns or pursue leads that may thwart impending threats” ( Obama ). By allowing…

    • 1264 Words
    • 6 Pages
    Superior Essays