Discuss vulnerabilities that were exploited in Equifax incident. Provide assessment of appropriate organizational and security controls that were put in place by the companybefore the breach.
TitleStart DateDue DatePost DateMarksAvailableThoroughly read the case. It is recommended that you read 2-3 times. Prepare a 5-page report (12-point font, double spaced not including the title page or referencepage), that addresses the following questions:Identify the key factors that created the weak security situation in a company. Discuss vulnerabilities that were exploited in Equifax incident. […]