1 - Unit 5 - Assignment 1 Frontsheet
1 - Unit 5 - Assignment 1 Frontsheet
Student declaration
I certify that the assignment submission is entirely my own work and I fully understand the consequences of plagiarism. I understand that
making a false declaration is a form of malpractice.
Student’s signature
Grading grid
P1 P2 P3 P4 M1 M2 D1
❒ Summative Feedback: ❒ Resubmission Feedback:
A security threat is an evil act that aims to disrupt an organization's systems, steal
information, or harm the entire organization. An event that could have exposed company information
or its organization is referred to as a security occasion. A security episode is also a circumstance that
leads to a data or organizational breach.
An IT project needs to keep an eye out for evolving and more sophisticated online security
risks in order to protect their data and organizations. They must first understand the different safety
risks they face in order to do that.
- Viruses: A virus is a piece of malicious software with the ability to replicate by inserting itself
into a host program or file. When someone activates it to spread without the system or user's
consent, it will not function.
- Worms: A worm is a computer program that spreads by itself without requiring user interaction
or internal replication. A worm that enters the system replicates immediately, infecting networks
and computers that aren't protected.
3.3. Ransomware
In a ransomware attack, the victim's PC is typically encrypted and locked, preventing the victim
from using the device or the information stored on it. The victim must make a payment to the
attacker, typically in a form of virtual currency like Bitcoin, in order to regain access to the device
or information. Through malicious email connections, corrupted software programs, contaminated
external storage devices, and compromised websites, ransomware can spread.
3.4. Botnet
A botnet is a collection of Internet-connected devices, such as PCs, smartphones, servers, and
Internet of Things (IoT) devices, that have been infected and are in some way restricted by a common
form of malware. Typically, botnet malware searches the internet for vulnerable devices. The goal
of the threat actor creating a botnet is to infect as many connected devices as is prudent, registering
the power and resources of those devices for computerized endeavors that typically remain hidden
from the clients of the devices. These botnets are controlled by threat actors, usually cybercriminals,
who use them to send spam emails, participate in click fraud campaigns, and generate harmful traffic
for distributed denial-of-service attacks.
4. What are recent security breaches? List and give an example
with dates
- Rockstar games data leaked: On September, 2022 a hacker with nickname Lapsus$ have
breached into Rockstar games database server and gotten information of their ongoing projects
and users’ personal information that have been registered on Rockstar’s social network which
troubled them for a very long time. Luckily, the attacker has been arrested and revealed to be
only 16 years old boy, however, he had already published the data onto the Internet before was
arrested.
- Socialarks: In August 2021, Bob Diachenko, a Comparitech network safety expert, accidentally
discovered his own information online after discovering an unstable data set that contained the
personal information of millions of visitors to Thailand. The unprotected Elasticsearch data set,
which was ten years old, contained the personal information of over 106 million travelers from
around the world, including their date of birth, full name, sex, passport number, residency status,
type of visa, and arrival card number.
Diachenko alarmed Thai specialists, who were alerted to the incident and received information
the following day.
- Android Users Data Leak: Security researchers discovered the personal information of more
than 100 million Android users exposed in May 2021 as a result of a few cloud administration
misconfigurations. Unprotected continuously data sets used by 23 applications saw a rise in
downloads from 10,000 to 10,000,000, including resources for interior designers. Researchers
from Check Point discovered that anyone could access sensitive and private information,
including names, email addresses, dates of birth, talk messages, locations, orientations,
passwords, photos, installation information, phone numbers, and pop-up messages.
If you've been staying updated on the news lately, you may have noticed that a number of data
breaches have been making headlines. These breaches frequently involve getting access to customer
data, including addresses, names, social security numbers, and even credit card numbers. Due to
lawsuits and lost business, these breaches could cost the affected companies millions of dollars.
Detecting, defining, and recovering from a breach can be a lengthy and time-consuming process for
an organization. Although the consequences of this type of leak can be devastating for larger
corporations, they can spell the end of a small business. The best strategy is to be ready if it happens
and to prevent it from happening in the first place.