Scenario 1
Security breaches today are all too common, with attackers constantly finding new and innovative ways of infiltrating organizations in search of valuable information.
Scroll down to read the latest breaking security news headline.
What Happened?
According to our sources, a well known hotel chain that operates across the world has reported a massive data breach, with the personal information of over three million guests exposed to hackers.
The hotel discovered that hackers gained access to its customer database by using the login details of one of its employees.
At this point, the hotel doesn’t believe that the hackers were able to access any account passwords or financial information. Recent guests are encouraged to check the hotel chain’s web portal to see if they have been impacted by this breach.
*This is a fictional scenario.
This is a multiple choice question. Once you have selected an option, select the submit button below to submit your answer.
In this example, what did the hackers take?
Select the correct answer, then Submit.
- The card payment information of over three million guests.
- The names, email address and phone numbers of over three million hotel guests.
- The hotel chain’s reputation.
- The username and password of all of the hotel’s employees.
Scenario 2
eLearning Platforms at Risk!
The team at DEXA is concerned. eLearning platforms are becoming prime targets for attackers as more and more organizations make the move to digital learning.
SCROLL down to find out more about a recent case.*
A popular online training platform admitted leaving the personal data of millions of its students (many of them minors) exposed on a publicly accessible cloud database.
Hackers were able to directly access students’ full names, email addresses, phone numbers, and school enrollment details from the Internet!
While it’s unclear what the hackers have done with this acquired information, it’s safe to say that they have everything they need to carry out widespread phishing or malware attacks.
What Exploits?
What exploits did the hackers use in this case to gain access to valuable personal information?
Select the correct answer, then Submit.
- Weaknesses in the platform’s security practices.
- Extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer.
- Bypassing the platform’s access control methods.
- Taking advantage of student information not being correctly validated on the platform.
second scenerio- Weaknesses in the platform’s security practices.
first scenario- The card payment information of over three million guests
SCENERIO 1; The names, email address and phone numbers of over three million hotel guests.
The hotel chain’s reputation.
SCENERIO 2;Weaknesses in the platform’s security practices.
The hotel chain’s reputation
Extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer.
SCENERIO 1; The names, email address and phone numbers of over three million hotel guests.
The hotel chain’s reputation.
SCENERIO 2;Weaknesses in the platform’s security practices.
Scenario 1: The names, email address and phone numbers of over three million hotel guests
Scenario 2: Weaknesses in the platform’s security practices.
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices.
The card payment information of over three million guests.
Misconfigured cloud database or lack of proper access
Answers
Q1. The card payment information of over three million guests.
Q2. Weaknesses in the platform’s security practices
Scenario 1 answers are no 1 and 2
Scenario 2 answers are no 1 and 3
1 The hotel chain’s reputation
2 Weaknesses in the platform’s security practices.
Answers
Q1. The card payment information of over three million guests.
Q2. Weaknesses in the platform’s security practices
1.The names, email address and phone numbers of over three million hotel guests
2.Weaknesses in the platform’s security practices.
1 scenario -:The names, email address and phone numbers of over three million hotel guests.
2:Weaknesses in the platform’s security practices.
`1. The names, email address and phone numbers of over three million hotel guests.
The hotel chain’s reputation.
2. Weaknesses in the platform’s security practices.
Weaknesses in the platform’s security practices.
The names, email address and phone numbers of over three million hotel guests.
The card payment information of over three million guests.
Weaknesses in the platform’s security practices.
1. The names, email address and phone numbers of over three million hotel guests.
2. Weaknesses in the platform’s security practices.
Scenario 1:
The names, email address and phone numbers of over three million hotel guests.
Scenario 2:
Weaknesses in the platform’s security practices.
Scenario one: The names, email address and phone numbers of over three million hotel guests.
Scenario two: Weaknesses in the platform’s security practices.
1: The names, email address and phone numbers of over three million hotel guests.
2:Weaknesses in the platform’s security practices.
Scenario 1
The hotel chain’s reputation
Scenario 2
Weaknesses in the platform’s security practices.
scenerio 1
The names, email address and phone numbers of over three million hotel guests
Scenerio 2
Weaknesses in the platform’s security practices
1. The names, email address and phone numbers of over three million hotel guests.
2. Weaknesses in the platform’s security practices.
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices.
Scenario 1:The username and password of all of the hotel’s employees.
Scenario 2: Weaknesses in the platform’s security practices.
Scenario one:The card payment information of over three million guests
Scenario two:Weaknesses in the platform’s security practices
Augustine Anuoluwapo
My Colour of Hat
1) white hat
2) black hat
3) white hat
4) gray hat
5) gray hat
Augustine Anuoluwapo
Scenario 1
The card payment information of over three million guests.
Scenario 2
Weaknesses in the platform’s security practices.
Scenario 1
The card payment information of over three million guests.
Scenario 2
Weaknesses in the platform’s security practices.
Weaknesses in the platform’s security practices.
Scenario 1 Answer: The names, email address and phone numbers of over three million hotel guests.
Scenario 2 Answer: Weaknesses in the platform’s security practices
1.The card payment information of over three million guests.
2.Weaknesses in the platform’s security practices.
Scenario 1: The names, email address and phone numbers of over three million hotel guests.
Scenario 2:Weaknesses in the platform’s security practices
Scenario 1: a) The names, email addresses and phone numbers of over 300million guests.
b) The hotel chains reputation
Scenario 2: Weaknesses in the platforms security practices.
Scenario 1: The names, email address and phone numbers of over three million hotel guests.
Scenario 2:Weaknesses in the platform’s security practices.
Weaknesses in the platform’s security practices.
Your point of view caught my eye and was very interesting. Thanks. I have a question for you.
Scenario 1: The names, email address and phone numbers of over three million hotel guests.
Scenario 2: Weaknesses in the platform’s security practices.
Extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer.
The username and password of all of the hotel’s employees
The username and password of all of the hotel’s employees.
senario 1; The username and password of all of the hotel’s employees.
senario 2; Weaknesses in the platform’s security practices.
Ouestion 1: The names, email address and phone numbers of over three million hotel guests.
Question 2: Weaknesses in the platform’s security practices.
scenario1. The names, email address and phone numbers of over three million hotel guests.
scenario2. weakness in the platform’s security practices.
1. The names, email addresses, and phone numbers of over three million hotel guests.
2. Weaknesses in the platform’s security practices.
The names, email address and phone numbers of over three million hotel guests.
Weaknesses in the platform’s security practices
Please how do i join the whatsapp group for Cyber Security students
1. The names, email addresses, and phone numbers of over three million hotel guests.
2. Weaknesses in the platform’s security practices.
The card payment information of over three million guests.
Weaknesses in the platform’s security practices.
The names, email address and phone numbers of over three million hotel guests.
Weaknesses in the platform’s security practices.
Weaknesses in the platform’s security practices.
The names, email address and phone numbers of over three million hotel guests.
Ouestion 1: The names, email address and phone numbers of over three million hotel guests.
Question 2: Weaknesses in the platform’s security practices.
White hat
Black hat
Gray hat
Black hat
White hat
Ouestion 1: The names, email address and phone numbers of over three million hotel guests.
Question 2: Weaknesses in the platform’s security practices.
Day 2,
Question 1: Grey hat
Question 2: Black hat
Question 3: White hat
Question 4: Black hat
Question 5: White hat
Question 1: The username and password of all of the hotel’s employees.
Question 2:Weaknesses in the platform’s security practices.
No, the photos are just inaccessible from the operating system.
Question 1: The names, email address and phone numbers of over three million hotel guests
Question 2: Weaknesses in the platform’s security practices.
Weaknesses in the platform’s security practices.
The card payment information of over three million guests
Extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer.
The card payment information of over three million guests.
The names, email address and phone numbers of over three million hotel guests.
Taking advantage of student information not being correctly validated on the platform.
The names, email address and phone numbers of over three million hotel guests
1. Weaknesses in the platform’s security practices.
2. The names, email address and phone numbers of over three million hotel guests.
The first answer is the names,email address and phone number of over three million hotel guests.
Scenario number 2 is weakness in the platform’s security practices.
The names, email address and phone numbers of over three million hotel guests.
2.
Weaknesses in the platform’s security practices.
Day 2
1. White hat
2. Black hat
3. White hat
4. Gray hat
5. White hat
Day 2
1. White hat
2. Black hat
3. White hat
4. Black hat
5. Gray hat
1. The hotel chain’s reputation
2. Bypassing the platform’s access control methods.
White
Black
Gray
Black
White
Scenario 1.
The card payment information of over three million guests.
Scenario 2.
Weaknesses in the platform’s security practices.
(1). The names, email address and phone numbers of over three million hotel guests.
(2). Weakness in the platforms practices.
1. The names, email address and phone numbers of over three million hotel guests.
2. Weaknesses in the platform’s security practices.
1. white hat
2. black hat
3. gray hat
4. black hat
5. white hat
1. The names, email address and phone numbers of over three million hotel guests.
2. Weaknesses in the platforms security practices.
1. The names, email address and phone numbers of over three million hotel guests.
2. Weaknesses in the platform’s security practices.
Scenario 1 : The card payment information of over three million guests
Scenario 2: weakness in the platform’s security practices
Scenario 1.
The names, email addresses and phone numbers of over 3 million hotel guests .
Scenario 2.
Weaknesses in the platform’s security practices.
1. Gray hat
2. Black hat
3. White hat
4. Black hat
5. Black hat
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices.
White hat
Black hat
Gray hat
Black hat
White hat
Scénario 1
Les noms, adresses e-mail et numéros de téléphone de plus de trois millions de clients d’hôtels.
Scénario 2
Faiblesses dans les pratiques de sécurité de la plateforme.
1. White hat
2. Black hat
3. White hat
4. Black hat
5. Gray hat
1 White Hat
2 Black Hat
3 Grey Hat
4Black Hat
5 White Hat
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices.
1. Gray hat
2. Black hat
3. White hat
4. Black hat
5. Gray hat
Scenario 1 The names, email address and phone numbers of over three million hotel guests.
Scenario 2 Extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer.
1. The names, email address and phone numbers of over three million hotel guests.
2. Taking advantage of student information not being correctly validated on the platform.
Scenario 1. The names, email address and phone numbers of over three million hotel guests.
Scenario 2. Weaknesses in the platform’s security practices.
Weaknesses in the platform’s security practices.
1. Grey hat
2.Black hat
3.White hat
4.Black hat
5.White hat
Day1:
1.The hotel chain’s reputation.
2.Bypassing the platform’s access control methods.
The names, email address and phone numbers of over three million hotel guests.
Weaknesses in the platform’s security practices.
White hat
Black hat
Gray hat
Day 2
1. Grey hat
2.Black hat
3.White hat
4.Black hat
5.White hat
1. White hat
2. Black hat
3. White hat
4. Gray hat
5. White hat
The names, email address and phone numbers of over three million hotel guests.
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices.
Weaknesses in the platform’s security practices.
Scenario 1
2. The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Taking advantage of student information not being correctly validated on the platform.
Day 2
1. Gray hat
2. Black hat
3. White hat
4. Gray hat
5. Gray hat
Day 2
1. Gray hat
2. Black hat
3. White hat
4. Black hat
5. Gray hat
Day 2
1. White hat
2. Black hat
3 White Hat
4. Black hat
5. Black hat
Weaknesses in the platform’s security practices.
The names, email address and phone numbers of over three million hotel guests.
Weaknesses in the platform’s security practices
The names, email address and phone numbers of over three million hotel guests. The names, email address and phone numbers of over three million hotel guests
The names, email address and phone numbers of over three million hotel guests and the hotel chains reputation
Weaknesses in the platforms security practices
The names, email addresses and phone numbers of over three million hotel guests.
The hotel chain’s reputation
Weaknesses in the platform’s security practices
Day 2
1. White Hat
2. Black Hat
3. White Hat
4. Gray Hat
5. Black Hat
Colour of Hat
White
Black
White
Gray
White
The names, email address and phone numbers of over three million hotel guests.
The names, email address and phone numbers of over three million hotel guests
The names, email address and phone numbers of over three million hotel guests
Weaknesses in the platform’s security practices.
What Color Is My Hat?
1. White hat
2. Black hat
3. White hat
4. Grey hat
5. Grey hat
Black hat
White hat
Day 2
Gray hat
Black hat
Gray
Gray
Gray
Weaknesses in the platforms security practices
Weaknesses in the platform’s security practices.
Day 2
White
Black
White
Gray
Gray
The names, email address and phone numbers of over three million hotel guests.
Day 2
Gray hat
Black hat
White hat
Black hat
White hat
Weaknesses in the platform’s security practices.
The card payment information of over three million guests.
White hat
Black hat
White hat
Black hat
Gray hat
Weaknesses in the platform’s security practices.
The hotel chain’s reputation.
1. Weaknesses in the platform’s security practices.
2. The names, email address and phone numbers of over three hotel guests.
COHORT 8, DAY 2:
Gray hat
Black hat
White hat
Black hat
White hat
Scenario 1
The username and Password of all the hotel’s employees
Scenario 2
Weaknesses in the platform’s security practices
The hotel chain’s reputation
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Taking advantage of student information not being correctly validated on the platform
(23/11/2024)
Day 2: cohort 8 Assessment answers
Cyber Attackers
1.Gray hat
2.Black hat
3.White hat
4.Black hat
5. White hat
1. White hat
2. Black hat
3. White hat
4. Gray hat
5. White hat
DAY 2
Assessment answers
1. Grey hat
2. Black hat
3. White hat
4. Black hat
5. White hat
My Day 2 Assessment
1. Gray hat
2. Black hat
3. White hat
4 Black hat
5White hat
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Taking advantage of student information not being correctly validated on the platform.
The names, email address and phone numbers of over three million hotel guests.
Weaknesses in the platform’s security practices.
Cyberattackers
1. Gray hat
2. Black hat
3. White hat
4. Black hat
5. White hat
Scenerio 1
The names, email address and phone numbers of over three million hotel guests.
Scenerio 2
Weaknesses in the platform’s security practices.
Day 2
1. Gray hat
2. Black hat
3. White hat
4. Black hat
5. White hat
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices.
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Taking advantage of student information not being correctly validated on the platform
Scenario 1:
The names, email addresses, and phone numbers of over three million hotel guests.
Scenario 2:
Weaknesses in the platform’s security practices.
Day 2
White hat attackers
Black hat
Gray hat
White hat
White hat
Day 2
White hat
Black hat
White hat
Gray hat
White hat
Day 2
1. Gray hat attacker
2.Black hat attacker
3. White hat attacker
4.Black hat attacker
5. White hat attacker
Scenario 1:
The names, email address and phone numbers of over three million hotel guests.
Scenario 2:
Weaknesses in the platform’s security practices.
scenario 1 : The hotel chain’s reputation
scenario2: Weaknesses in the platform’s security practices.
The names, email address and phone numbers of over three million hotel guests.
Scenario 1
1. The card payment information of over three million guests.
Scenario 2
2. Extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer.
Scenario 1.
The hotel chain’s reputation.
Scenario 2
Weaknesses in the platform’s security practices.
Scenario 1 The names, email address and phone numbers of over three million hotel guests.
Scenario 2 Extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer.
Scenario 1.
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices.
Scenario 1:
The names, email address and phone numbers of over three million hotel guests.
Scenario 2:
Taking advantage of student information not being correctly validated on the platform.
Day 2
Assessment Answers
1. White hat
2. Black hat
3. White hat
4, Black hat
5. Gray hat
1. Gray Hat
2. Black Hat
3. White Hat
4. Black Hat
5. White Hat
1. White hat
2. Black hat
3. Gray hat
4. Black hat
5. White hat
Day 2
Assessment Answers
1. White hat
2.White hat
3. Black hat
4.White hat
5. Grey hat
Correct Answer for Day 2
Assessment Answers
1. White hat
2. Black hat
3. White hat
4, Black hat
5. Gray hat
Scenario 1
Hotels chains reputation
scenario 2
Weakness in the platform security practices.
Scenario 1
The names, email address and phone numbers of over three million hotel guests
Scenario 2
Weaknesses in the platform’s security practices.
1. The names, email address and phone numbers of over three million hotel guests.
2. Weaknesses in the platform’s security practice
Weaknesses in the platform’s security practices. For senerio 2
The username and password of all of the hotel’s employees. For senerio 1
*Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Taking advantage of student information not being correctly validated on the platform.
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer.
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices.
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer.
Day 2 cohort 8
1.White hat
2. Black hat
3. White hat
4. Black hat
5. White hat
Scenario 1 The names, email address and phone numbers of over three million hotel guests.
Scenario 2 Weaknesses in the platform’s security practices.
Scenario 1 answer
The card payment information of over three million guests.
The names, email address and phone numbers of over three million hotel guests.
Scenario 2 answer
Extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer.
Day 2, cohort 8 answers
1. Grey hat
2. Black hat
3. White hat
4. Black hat
5. White hat
Scenario 1: The hotel chain’s reputation.
Scenario 2: Weaknesses in the platform’s security practices.
Scenario number 1 is the names,email address and phone number of over three million hotel guests.
Scenario number 2 is weakness in the platform’s security practices.
3 is my Answer
Scenario 1:
The names, email address and phone numbers of over three million hotel guests.
Scenario 2:
Weaknesses in the platform’s security practices.
Scenario 1
3.The hotel chain’s reputation
Scenario 2
Weaknesses in the platform’s security practices.
Scenario 1:
The names, email address and phone numbers of over three million hotel guests
Scenario 2:
Weaknesses in the platform’s security practices.
1.The names, email address and phone numbers of over three million hotel guests
2.Weaknesses in the platform’s security practices.
The hotel chain’s reputation.
1. The names, email address and phone numbers of over three million hotel guests.
2 Taking advantage of student information not being correctly validated on the platform.
2.Weaknesses in the platform’s security practices.
The names, email address and phone numbers of over three million hotel guests.
Scenerio 1: The names, email address and phone numbers of over three million hotel guests.
Scenerio 2: Weaknesses in the platform’s security practices.
1. The names, email address and phone numbers of over three million hotel guests.
2.Weaknesses in the platform’s security practices.
1. The names, email address and phone numbers of over three million hotel guests.
2. Weaknesses in the platform’s security practices.
Scenerio 1: The names, email address and phone numbers of over three million hotel guests.
Scenerio 2: Weaknesses in the platform’s security practices.
Scenario 1
Answer: The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Answer: Weaknesses in the platform’s security practices.
Weaknesses in the platform’s security practices.
The names, email address and phone numbers of over three million hotel guests.
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices.
Scenario 1: The card payment information of over three million guests.
Scenario 2: Weaknesses in the platform’s security practices.
Scenario 1-The names, email address and phone numbers of over three million hotel guests.
Scenario 2-Weaknesses in the platform’s security practices.
Scenario 1: The names, email address and phone numbers of over three million hotel guests.
Scenario 2: Weaknesses in the platform’s security practices.
Scenario 1: The names, email address and phone numbers of over three million hotel guests.
Scenario 2: Weaknesses in the platform’s security practices.
Case 1 _ The names, email address and phone numbers of over three million hotel guests.
Case 2 _ weaknesses in the platform’s security practices
* The names, email address and phone numbers of over three million hotel guests.
*Weaknesses in the platform’s security practices.
Scenario 1: The names, email address and phone numbers of over three million hotel guests.
Scenario 2: Weaknesses in the platform’s security practices
Scenario 1 The username and password of all of the hotel’s employees.
Scenario 2 Weaknesses in the platform’s security practices.
Weaknesses in the platform’s security practices.
Senerio 1- the names, email address and phone numbers of over 3 million hotel guests
Senerio 2- weakness in the platforms security practices
Scenerio 1: The names, email address and phone numbers of over three million hotel guests
Scenario 2: Weaknesses in the platform’s security practices.
Scenario 1: The hotel chain’s reputation.
Scenario 2: Weaknesses in the platform’s security practices.
Scenario 1: The names, email address and phone numbers of over three million hotel guests
Scenario 2: Weaknesses in the platform’s security practices.
SCENARIO 1: The names, email addresses, and phone numbers of over three million hotel guests
SCENARIO 2: Weaknesses in the platform’s security practices.
The names, email address and phone numbers of over three million hotel guests.
Weaknesses in the platform’s security practices.
Scenario 1: The names, email address and phone numbers of over three million hotel guests.
Scenario 2: Weaknesses in the platform’s security practices.
SCENERIO 1: The names, email address and phone numbers of over three million hotel guests
SCENERIO 2: Weaknesses in the platform’s security practices.
SCENARIO 1: The names, email addresses and phone numbers of over three million hotel guests
SCENARIO 2: Weaknesses in the platform’s security practices.
Weaknesses in the platform’s security practices.
The names, email address and phone numbers of over three million hotel guests.
SCENERIO 1: The names, email address and phone numbers of over three million hotel guests.
SCENERIO 2: Weaknesses in the platform’s security practices.
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices.
SCENARIO 2
Weaknesses in the platform’s security practices.
SCENARIO 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Taking advantage of student information not being correctly validated on the platform.
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices
Scenero 1
The username and password of all of the hotel’s employees.
Scenario 1
.The hotel chain’s reputation.
Scenery 2
Extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer.
The names, email address and phone numbers of over three million hotel guests.
Weaknesses in the platform’s security practices.
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices.
Weaknesses in the platform’s security practices
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices.
Bypassing the platform’s access control methods
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Bypassing the platform’s access control methods.
Scenario 1
The username and password of all of the hotel’s employees.
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices.
Weaknesses in the platform’s security practices.
The card payment information of over three million guests.
1. White
2. Black
3. White
4. Gray
5. White
Weaknesses in the platform’s security practices.
The card payment information of over three million guests.
Weaknesses in the platform’s security practices
The card payment information of over three million guest
1 white hat
2 black hat
3 Gray hat
4 black hat
5 white hat
1a. The names, email, address and phone number of over 3 million guest
B. Hotel chains reputation.
2. Weakness in the platforms security practices
1. The names, email addresses, and phone numbers of over three million hotel guests.
2. Weaknesses in the platform’s security practices.
1.) The card payment information of over three million guests.
2.) Weaknesses in the platform’s security practices.
1.The names, email address and phone numbers of over three million hotel guests.
2.Weakness in the platforms security practice
1.The names, email address and phone numbers of over three million hotel guests.
2. Weaknesses in the platform’s security practices.
1. The names, email address and phone numbers of over three million hotel guests.
2. Weaknesses in the platform’s security practices.
Weaknesses in the platform’s security practices.
Bypassing the platform’s access control methods.
1. The names, email address and phone numbers of over three million hotel guests.
2. Weaknesses in the platform’s security practices.
2 Weaknesses in the platform’s security practices.
Dexa is a place to learn indeed. Am really enjoying the training
1. The names, email address and phone numbers of over three million hotel guests.
2. Weaknesses in the platform’s security practices.
1. The names, email address and phone numbers of over three million hotel guests
2.Taking advantage of student information not being correctly v
1. The hotel’s chain reputation
2. Weaknesses in the platform security practices
1. The names, email address and phone numbers of over three million hotel guests
2.Taking advantage of student information not being correctly validated on the platform.
1. Gray hat
2. Black hat
3. White hat
4. Black hat
5. Gray hat
The names, email address and phone numbers of over three million hotel guests.
Weaknesses in the platform’s security practices.
1. White hat
2. Black hat
3. White hat
4. Black hat
5. White/Gray hat
Weaknesses in the platform’s security practices.
The names, email address and phone numbers of over three million hotel guests.
The names, email address and phone numbers of over three million hotel guests.
Weaknesses in the platform’s security practices.
Weaknesses in the platform’s security practices.
The names, email address and phone numbers of over three million hotel guests.
They exploited It using the weaknesses in the Platforms Security practices
Weaknesses in the platform’s security practices.
The username and password of all of the hotel’s employees.
The username and password of all of the hotel’s employees.
Weaknesses in the platform’s security practices.
Weaknesses in the platform’s security practices.
The names, email address and phone numbers of over three million hotel guests.
Taking advantage of student information not being correctly validated on the platform.
1. The names, email address and phone numbers of over three million hotel guests.
2. Weaknesses in the platform’s security practices.
Question 1
The names, email address and phone numbers of over three million hotel guests.
Question 2
Weaknesses in the platform’s security practices.
White hat
Black hat
Gray hat
Black hat
Gray Hat
Question 1. The username and password of all of the hotel’s employees.
Question 2. Weaknesses in the platform’s security practices.
Question 1. The names, email address and phone numbers o
Question 2. Weaknesses in the platform’s security practices.
1) black hat
2)gray hat
3)white hat
4) black hat
5)gray hat
The names, email address and phone numbers of over three million hotel guests.
Weaknesses in the platform’s security practices.
Second test
white hat
Black hat
White hat
Black hat
White hat
The names, email address and phone numbers of over three million hotel guests.
Weaknesses in the platform’s security practices.
The names, email address and phone numbers of over three million hotel guests.
Weaknesses in the platform’s security practices.
The names, email address and phone numbers of over three million hotel guests.
Bypassing the platform’s access control methods
The names, email address and phone numbers of over three million hotel guests.
Weaknesses in the platform’s security practices.
The card payment information of over three million guests.
Weaknesses in the platform’s security practices.
White hat
Black hat
White hat
Black hat
Grey/White hat
The card payment information of over three million guests.
Weaknesses in the platform’s security practices.
1. Gray
2. Black
3. White
4. Black
5. White
SCENARIO 1
The names, email address and phone numbers of over three million hotel guests.
SCENARIO 2
Weaknesses in the platform’s security practices.
SCENARIO 1
The names, email address and phone numbers of over three million hotel guests.
SCENARIO 2
Weaknesses in the platform’s security practices.
The card payment information of over three million guests.
Weaknesses in the platform’s security practices.
Extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer.
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices.
Scenario 1:
The hotel chain’s reputation.
Scenario 2:
Weaknesses in the platform’s security practices
2)Weaknesses in the platform’s security practices.
1)The hotel chain’s reputation.
On the questions on categories of hackers
1. Grey hat
2. Black hat
3. White hat
4. Black hat
5. Grey hat
Gray hat
Black hat
White hat
Gray hat
White hat
Weaknesses in the platform’s security practices.
Scenerio 2. Weaknesses in the platform’s security practices.
Scenerio 1. The names, email address and phone numbers of over three million hotel guests.
On Cyber Attack
1 Gray hat
2 Black hat
3 White hat
4 Gray hat
5 White hat
1. Weaknesses in the platform’s security practices.
2.The card payment information of over three million guests.
Weaknesses in the platform’s security practices.
The names, email address and phone numbers of over three million hotel guests.
1.Weaknesses in the platform’s security practices.
2.The card payment information of over three million guests.
White hat
Black hat
White hat
Black hat
Grey hat
Weaknesses in the platform’s security practices.
Scenario 1: The names, email address and phone numbers of over three million hotel guests.
On Cyber Attack
1 Gray hat
2 Black hat
3 White hat
4 Gray hat
5 White hat
Scenario 1: The names, email addresses and phone numbers of over three million hotel guests.
Scenario 2: Taking advantage of students information not being correctly validated on the platform.
Scenario 1: The names, email address and phone numbers of over three million hotel guests
Scenario 2: Taking advantage of student information not being correctly validated on the platform.
The hotel chain’s reputation.
memory buffer.
Taking advantage of student information not being correctly validated on the platform.
Day 2
1. White hat hackers
2. Black hat hackers
3. White hat hackers
4. Gray hat hackers
5. White hat hackers
Scenario 1
The hotel chain’s reputation.
Scenario 2
Weaknesses in the platform’s security practices.
The names, email address and phone numbers of over three million hotel guests.
Weaknesses in the platform’s security practices
The names, email address and phone numbers of over three million hotel guests.
Weaknesses in the platform’s security practices
The names, email address and phone numbers of over three million hotel guests.
Weaknesses in the platform’s security practices.
The names, email address and phone numbers of over three million hotel guests.
Weaknesses in the platform’s security practices.
The names, email address and phone numbers of over three million hotel guests.
Weaknesses in the platform’s security practices
* Gray hat
* Black hat
* White hat
* Gray hat
* White hat
1. The names, email address and phone numbers of over three million hotel guests.
2. Weaknesses in the platform’s security practices.
1. The names, email address and phone numbers of over three million hotel guests.
2. Weaknesses in the platform’s security practices.
The names, email address and phone numbers of over three million hotel guests.
Weaknesses in the platform’s security practices.
Gray hat
Black hat
White hat
Grey hat
The names, email address and phone numbers of over three million hotel guests
Weaknesses in the platform’s security practices.
White hat
Black hat
White hat
Black hat
Gray hat
Scenario 2
Weaknesses in the platform’s security practices.
The hotel chain’s reputation.
Grey hat
Black hat
White hat
Black hat
White hat.
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices.
*Gray Hat Attackers
*Black Hat Attackers
*White Hat Attacters
*Black Hat Attackers
*Gray Hat Attackers
1.The name,email address and phone number of over 3 million guest
2.Weaknesses in the platform’s security practices.
1]Black hat
2]Black hat
3]White hat
4]Black hat
5]Black hat
The names, email address and phone numbers of over three million hotel guests
Day 2
1- Gray hat
2- Black hat
3- white hat
4- Black hat
5- Gray hat
Answers to questions for day 2
1. White hat
2. Black hat
3. White hat
4. Black hat
5. Gray hat
The names, email address and phone numbers of over three million hotel guests.
The names, email address and phone numbers of over three million hotel guests.
2.weaknessess in the platform’s security practices
1. The names, email address and phone numbers of over three million hotel guests.
2.weaknessess in the platform’s security practices
Scenario 1 ;The names, email address and phone numbers of over three million hotel guests.
Scenario 2 ;Weaknesses in the platform’s security practices.
Scenario 1
The hotel chain reputation
Scenario 2
Weakness in the platform security practices
Weaknesses in the platform’s security practices.
The names, email address and phone numbers of over three million hotel guests.
The names, email address and phone numbers of over three million hotel guests.
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices.
Extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer.
The names, email address and phone numbers of over three million hotel guests.
Scenario One;
The names, email address and phone numbers of over three million hotel guests.
Scenario Two;
Weaknesses in the platform’s security practices.
Weaknesses in the platform’s security practices.
senerio 1
3; The hotel chain’s reputation
senerio 2
1; weakness in the platform’s security practices
Day 1
The card payment information of over three million guests.
Weaknesses in the platform’s security practices.
Scenario 1
It’s safe to say they took:
The card payment information of over three million guests.
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices
What colour of Hat
1. White hat
2. Black Hat
3.White hat
4.Black Hat
5.White Hat
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
The hotel chain’s reputation.
Scenario 2
Weaknesses in the platform’s security practices.
DAY 2
1. White hat
2. Black hat
3. White hat
4. Black hat
5. Gray hat
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices.
Day 2
1. White hat
2. Black hat
3. White hat
4. Gray hat
5. White hat
1.White hat
2.Black hat
3.White hat
4.Black hat
5.Gray hat
Day 1
scenario 1
The names, email address and phone numbers of over three million hotel guests.
The hotel chain’s reputation.
Scenario 2
Weaknesses in the platform’s security practices.
Bypassing the platform’s access control methods.
day 1
scenario 1.
2. the names, email address and phone numbers of over three million guests
scenario 2.
weaknesses in the platform’s security practices
Day 2
1. Grey hat
2. Black hat
3. Whit hat
4. Black hat
5. White hat
Scenario 1 :
The hotel chain’s reputation.
Scenario 2:
Weaknesses in the platform’s security practices.
DAY 1
1. The hotel chain’s reputation.
2. Weaknesses in the platform’s security practice
DAY 2
Answers to today’s questions
1. After hacking into ATM systems remotely using a laptop, this attacker worked with the ATM manufacturers to resolve the identified security vulnerabilities.
Ans-White hat
2. This attacker transferred $10 million into their bank account using customer account and PIN credentials gathered from recordings.
Ans-Black hat
3. This attacker’s job is to identify weaknesses in a company’s computer system.
Ans-White hat
4. This attacker used malware to compromise a company’s system and steal credit card information that was then sold to the highest bidder.
Ans-Black hat
5. While carrying out some research, this attacker stumbled across a security vulnerability on an organization’s network that they are authorized to access.
Ans-White hat
Day 2 answers:
. After hacking into ATM systems remotely using a laptop, this attacker worked with the ATM manufacturers to resolve the identified security vulnerabilities.
White hat
This attacker transferred $10 million into their bank account using customer account and PIN credentials gathered from recordings.
Black hat
This attacker’s job is to identify weaknesses in a company’s computer system.
White hat
This attacker used malware to compromise a company’s system and steal credit card information that was then sold to the highest bidder.
Gray hat
While carrying out some research, this attacker stumbled across a security vulnerability on an organization’s network that they are authorized to access.
White hat
Scenario 1 :
The username and password of all of the hotel’s employees.
Scenario 2:
Weaknesses in the platform’s security practices.
Day 2 Answers:
1. White hat
2. Black Hat
3. White Hat
4. Grey hat
5. White Hat
Weaknesses in the platform’s security practices.
Scenario 1 :
The username and password of all of the hotel’s employees.
Scenario 2:
Weaknesses in the platform’s security practices.
1. White hat
2. Black hat
3. Gray hat
4. Black hat
5. White hat
1. White hat
2. Black hat
3. White hat
4. Black hat
5. White hat
1. White hat
2. Black hat
3. White hat
4. Black hat
5. White hat
Scenario 1 – The names, email address and phone numbers of over three million hotel guests.
Scenario 2 – Weaknesses in the platform’s security practices.
Day 2:
1. White hat
2. Black hat
3. White hat
4. Black hat
5. White hat
Scenario 1.
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices.
scenario 1 The names, email address and phone numbers of over three million hotel guests.
Scenario 2, Taking advantage of student information not being correctly validated on the platform
Day 2:
1. Gray hat
2. Black hat
3. White hat
4. Black hat
5. White hat
Scenario 2
Weaknesses in the platform’s security practices.
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices.
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices.
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices.
Scenario 1
The card payment information of over three million guests.
Scenario 2
Bypassing the platform’s access control methods.
Scenario 1
The card payment information of over three million guests.
Scenario 2
Weaknesses in the platform’s security practices
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices
Scenario 1: The names, email addresses and phone numbers of over three million hotel guests
Scenario 2: Weaknesses in the platform’s security practices
Scenario One: The names, email addresses and phone numbers of over three million hotel guests
Scenario two: Weaknesses in the platform’s security practices
Weaknesses in the platform’s security practices.
The names, email address and phone numbers of over three million hotel guests.
Bypassing the platform’s access control methods.
Weaknesses in the platform’s security practices.
The names, email address and phone numbers of over three million hotel guests.
The names, email address and phone numbers of over three million hotel guests.
The names, email address and phone numbers of over three million hotel guests
Extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer
Scene 2
Extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer.
The card payment information of over three million guests.
The names, email address and phone numbers of over three million hotel guests.
The hotel chain’s reputation.
The username and password of all of the hotel’s employees.
Weaknesses in the platform’s security practices.
Scenario 2:
1. Weaknesses in the platform’s security practices.
2. Extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer.
3. Bypassing the platform’s access control
Scenario 1: The names, email address and phone numbers of over three million hotel guests.
The hotel chain’s reputation.
The username and password of all of the hotel’s employees.
1.The names, email address and phone numbers of over three million hotel guests.
2. Weaknesses in the platform’s security practices.
In the first scenario: The hotel chain’s reputation.
In the second scenario: Weaknesses in the platform’s security practices.
Scenario 1:
The names, email address and phone numbers of over three million hotel guests.
Scenario 2:
Weaknesses in the platform’s security practices.
In the first scenario, The names, email address and phone numbers of over three million hotel guests.
The second scenario is Weaknesses in the platform’s security practices.
Scenario 1. The hotel chain’s reputation.
Scenario 2. Weaknesses in the platform’s security practices.
Scenario 1: The names, email address and phone numbers of over three million hotel guests.
Scenario 2: Bypassing the platform’s access control methods.
Scenario 1: The names, email address and phone numbers of over three million hotel guests.
Scenario 2: Weaknesses in the platform’s security practices.
Weaknesses in the platform’s security practices.
Scenario 1: The hotel chain’s reputation.
Scenario 2: Weaknesses in the platform’s security practices
The names, email address and phone numbers of over three million hotel guests.
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices.
The hotel chain’s reputation.
Weaknesses in the platform’s security practices.
SCENARIO 1: The names, email addresses, and phone numbers of over three million hotel guests
SCENARIO 2:Weaknesses in the platform’s security practices
Scenario 1: The username and password of all of the hotel’s employees.
Scenario 2: Weaknesses in the platform’s security practices.
3. The hotel’s chain reputation
Scenario 2: weakness in the platform’s security practice
The names, email address and phone numbers of over three million hotel guests
Weaknesses in the platform’s security practices.
1. The names, email address and phone numbers of over three million hotel guest
2. Weaknesses in the platform’s security practices
SCENARIO 1- The names, email address and phone numbers of over three million hotel guests
SCENARIO 2- Weaknesses in the platform’s security practices.
1. The names, email address and phone numbers of over three million hotel guests.
2. Weaknesses in the platform’s security practices.
SCENARIO 1 – Over three million hotel guests’ names, email addresses, and phone numbers.
SCENARIO 2 – Weaknesses in the platform’s security practices.
SCENARIO 1 – The names, email address and phone numbers of over three million hotel guests.
SCENARIO 2 – Weaknesses in the platform’s security practices.
Scene 1 The names, email address and phone numbers of over three million hotel guests.
Scene 2 Weaknesses in the platform’s security practices.
Scene 1:
The names, email address and phone numbers of over three million hotel guests
Scene 2:
Weaknesses in the platform’s security practices.
1). The names, email address and phone numbers of over three million hotel guests.
2). Weakness in the platform’s security practices.
Scenario 1:
2. The names, email address and phone numbers of over three million hotel guests.
Scenario 2:
Weaknesses in the platform’s security practices.
Scenario 1. The username and password of all of the hotel’s employees.
Scenario 2Weaknesses in the platform’s security practices.
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices.
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices.
Scenario 1:
The names, email address and phone numbers of over three million hotel guests.
Scenario 2:
Weaknesses in the platform’s security practices.
SCENERIO 1
2. The names, email address and phone numbers of over three million hotel guests
SCENERIO 2
Weaknesses in the platform’s security practices.
1. The names, email address and phone numbers of over three million hotel guests.
2. Weaknesses in the platform’s security practices.
1.The names, email address and phone numbers of over three million hotel guests.
2.Weaknesses in the platform’s security practices.
Scenario 1
The card payment information of over three million guests.
The names, email address and phone numbers of over three million hotel guests.
The hotel chain’s reputation.
Scenario 2
Weaknesses in the platform’s security practices
Scenario 1.
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices.
Scenario 1: The names, email address and phone numbers of over three million hotel guests.
Scenario 2: Weaknesses in the platform’s security practices.
Scenario 1: The names, email addresses, and phone numbers of over three million hotel guests.
Scenario 2: Weaknesses in the platform’s security practices.
1. The names, email address and phone numbers of over three million hotel guests.
2. Weaknesses in the platform’s security practices.
Ofoche Stanley cohort 7 team 5
Scenario 1: The names, email address and phone numbers of over three million hotel guests.
Scenario 2: Weaknesses in the platform’s security practices.
Scenario 1. The card payment information of over three million guests.
Scenario 2. Weaknesses in the platform’s security practices.
scenario 1: The names, email address and phone numbers of over three million hotel guests.
scenario 2: Weaknesses in the platform’s security practices.
Correction to scenario 2:
The correct answer is-
weaknesses in the platforms security practices
Since they admitted leaving all the student information on a publicly accessible cloud service.
Prisca Ifediba Alachebe- Team 3
Scenario 1- answer is The names, email address and phone numbers of over three million hotel guests.
Since the hotel is sure that the financial information of the clients are not affected.
Scenario 2. Answer-
Taking advantage of student information not being correctly validated on the platform.
Since the majority of hacked accounts are minors, they might not have properly validated their account details, therefore exposing them to hack attacks.
The card payment information of over three million guests.
Weaknesses in the platform’s security practices.
Taking advantage of student information not being correctly validated on the platform.
1)The names, email address and phone numbers of over three million hotel guests.
2)Weaknesses in the platform’s security practices.
Weaknesses in the platform’s security practices.
1. The names, email address and phone numbers of over three million hotel guests.
2. Weaknesses in the platforms security practices
1st scenario: The names, email address and phone numbers of over three million hotel guests.
2nd Scenario: Weaknesses in the platform’s security practices.
1. The names, email address and phone numbers of over three million hotel guests.
2. Weaknesses in the platform’s security practices.
1. The names, email address and phone numbers of over three million hotel guests.
2. Weaknesses in the platform’s security practices.
Scenario 1
Ans. 2.The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Ans. Weaknesses in the platform’s security practices.
Senario 1
The names, email address and phone numbers of over three million hotel guests.
Senario 2
Weaknesses in the platform’s security practices.
Senario 1
The names, email address and phone numbers of over three million hotel guests.
Senario 2
Weaknesses in the platform’s security practices.
White hat
Black hat
White hat
Gray hat
White hat
Weaknesses in the platform’s security practices.
The card payment information of over three million guests.
The names, email address and phone numbers of over three million hotel guests.
The hotel chain’s reputation
1. The names, email address and phone numbers of over three million hotel guests.
2. Weaknesses in the platform’s security practices
The names, email address and phone numbers of over three million hotel guests.
Day 1
Scenario 1
The names, email address and phone numbers of over three
Scenario 2
Weaknesses in the platform’s security practices
1 Router
2 Firewall
3 VPN
4 Antimalware
1.Gray hat
2.Black hat
3.White hat
4.Black hat
5.Gray hat
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platforms security practices.
Day 2: Hackers/Attackers.
1. Gray hat
2. Black hat
3. White hat
4. Black hat
5. White hat
The hackers took the information of the hotel hotel customers, by gaining access through the employees details.
Day 2
White hat
Black hat
Gray hat
Grey hat
White hat
Scenario 1
The username and password of all of the hotel’s employees.
Scenario 2
Weaknesses in the platform’s security practices.
1. Gray hat
2. Black hat
3. White hat
4. Black hat
5. White hat
1, White hat
2, Black Hat
3, Gray Hat
4, Black Hat
5,White Hat
1, 1he names, email address and phone numbers of over three million hotel guests.
2,Weaknesses in the platform’s security practices.
Scenario 1:
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices.
The names, email address and phone numbers of over three million hotel guests.
Day 2:
1. White hat
2. Black hat
3. Gray hat
4. Black hat
5. Gray hat
Day 2
1. White hat
2. Black hat
3. Grey hat
4. Grey hat
5. White hat
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices.
DAY 2
1. White hat
2. Black hat
3. White hat
4. Black hat
5. Gray hat
Scenario 1
The card payment information of over three million guests.
Scenario 2
Weaknesses in the platform’s security practices.
DAY 2
1. White hat
2. Black hat
3. White hat
4. Black hat
5. Gray hat
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices.
Scenario 1:
numbers of over three million hotel guests.
3. The hotel chain’s reputation.
Scenario 2:
Extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer.
Extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer.
DAY 2 1 Gray hat 2 Black hat 3 White hat 4 Gray hat 5 White hat
scenario 1: The names, email address and phone numbers of over three million hotel guests. scenario 2: Weaknesses in the platform’s security practices.
Scenario 1: The names, email address and phone numbers of over three million hotel guests.
Scenario 2: Weaknesses in the platform’s security practices.
DAY 2
1. white
2. Black
3.white
4. Black
5.white
DAY 1
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices.
Day 2
1. White hat
2. Black hat
3. White hat
4. White hat
5. Gray hat
*4. Black hat
Day 2
1. White
2. Black
3. White
4. Black
5. Gray
Day 2
1. Gray hat
2. Black hat
3. White hat
4. Gray hat
5. White hat
1. White Hat
2. Black Hat
3. Gray Hat
4. Black Hat
5. White Hat
Day 1
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices.
1.white hat
2.gray hat
3.black hat
4.white hat
5.black hat
Day 2
1 . White hat
2 . Black hat
3 . White hat
4 . Black hat
5 . White hat
Day 2
1 . White hat
2 . Black hat
3 . White hat
4 . Black hat
5 . White hat
Gray hat
Black hat
White hat
Black hat
White hat
Day 2
1. Gray hat
2. Black hat
3. White hat
4. Black hat
5. Gray hat
Day 2
No 1..White hat
No 2..Black hat
No 3..White hat
No 4..Black hat
No 5..Gray hat
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices.
Scenario 1
The hackers took the hotel chain’s reputation.
Scenario 2
The hackers exploited the weaknesses in the platform’s security practices.
Scenario 1: The names, email address and phone numbers of over three million hotel guests.
Scenario 2: Taking advantage of student information not being correctly validated on the platform.
Scenario 1-The names, email address and phone numbers of over three million hotel guests.
Scenario 2-Weaknesses in the platform’s security practices.
Scenario 1-The names, email address and phone numbers of over three million hotel guests.
Weaknesses in the platform’s security practices.
The names, email address and phone numbers of over three million hotel guests.
The names, email address and phone numbers of over three million hotel guests.
Taking advantage of student information not being correctly validated on the platform.
The names, email address and phone numbers of over three million hotel guests.
Weaknesses in the platform’s security practices.
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices.
Scenario 1
1.The names, email address and phone numbers of over three million hotel guests
Scenario 2
2. Weaknesses in the platform’s security practices.
Senario 1
The names, email address and phone numbers of over three million hotel guests.
Senario 2
Weaknesses in the platform’s security practices.
Scenerio1
The names, email address and phone numbers of over three million hotel guests.
Scenerio2
Weaknesses in the platform’s security practices.
2. Weaknesses in the platform’s security practices.
1. The names, email address and phone numbers of over three million hotel guests
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices.
1. The names, email address and phone numbers of over three million hotel guests.
2 Weaknesses in the platform’s security practices.
scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices.
1. The names, email address and phone numbers of over three million hotel guests
2. Weaknesses in the platform’s security practices.
3. The hotel chain’s reputation.
. Weaknesses in the platform’s security practices.
Weaknesses in the platform’s security practices.
Weaknesses in the platform’s security practices.
Weaknesses in the platform’s security practices.
The names, email address and phone numbers of over three million hotel guests.
The hotel chain’s reputation
The names, email address and phone numbers of over three million hotel guests.
1 . The hotel chain’s reputation.
2.Weaknesses in the platform’s security practices
The names, email address and phone numbers of over three million hotel guests
Weaknesses in the platform’s security practices.
The names, email address and phone numbers of over three million hotel guests.
1.The names, email address and phone numbers of over three million hotel guests.
2.Weaknesses in the platform’s security practices.
Scenario 1 answer: The names, email address and phone numbers of over three million hotel guests.
Scenario 2 answer: Weaknesses in the platform’s security practices.
The names, email address and phone numbers of over three million hotel guests
Weaknesses in the platform’s security practices.
Weaknesses in the platform’s security practices
The names, email address and phone numbers of over three million hotel guests.
The names, email address and phone numbers of over three million hotel guests.
Weaknesses in the platform’s security practices.
1.The names, email address and phone numbers of over three million hotel guests.
2.Weaknesses in the platform’s security practices.
The names, email address and phone numbers of over three million hotel guests
1. The hotel chain’s reputation.
2. Weaknesses in the platform’s security practices.
1. The hotel chain’s reputation.
2. Weaknesses in the platform’s security practices.
1.
The hotel chain’s reputation
2.
Weaknesses in the platform’s security practices
1-White
2-Black
3-White
4-Gray
5-White
scenario 1
The hotel chain’s reputation.
scenario 2
Weaknesses in the platform’s security practices.
Weaknesses in the platform’s security practices.
The names, email address and phone numbers of over three million hotel guests.
Scenario 1
The hotel chain’s reputation.
Scenario 2
Weaknesses in the platform’s security practices.
The names, email address and phone numbers of over three million hotel guests.
Weaknesses in the platform’s security practices
Scenario 1:
The hotel chain’s reputation.
Scenario 2:
Weaknesses in the platform’s security practices.
Scenario 1:
The hotel chain’s reputation.
Scenario 2
Bypassing the platform’s access control methods.
1. White hat attacker
2. Black hat attacker
3. White hat attacker
4. Black hat attacker
5. White hat attacker
Scenario 1
The card payment information of over three million guests.
Scenario 2
Weaknesses in the platform’s security practices.
1-White
2-Black
3-White
4-Gray
5-White
Bypassing the platform’s access control methods.
The hotel chain’s reputation.
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices.
1. The names, email address and phone numbers of over three million hotel guests.
2. Weaknesses in the platform’s security practices.
1. The card payment information of over three million guests.
2. Weaknesses in the platform’s security practices.
Weaknesses in the platform’s security practices.
The names, email address and phone numbers of over three million hotel guests
Taking advantage of student information not being correctly validated on the platform.
The names, email address and phone numbers of over three million hotel guests.
CHRISTOPHER CHINEDU NWIKE
Scenario 1
The names, email addresses, and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices.
Day 2 what colour is my hat
1. White hat
2. Black hat
3.White, gray and black hat
4,Black hat
5.White hat
Scenario 1
The card payment information of over three million guests.
The names, email address and phone numbers of over three million hotel guests.
The hotel chain’s reputation.
Scenario 2
Weaknesses in the platform’s security practices.
Scenario 1
The card payment information of over three million guests
Scenario 2
Weaknesses in the platform’s security practices.
The names, email address and phone numbers of oveer three million guests.
Weaknesses in the platform’s security practices.
Cisco’s ISR 4000 provides routing, filtering and encryption in a single platform.
1. Router
Cisco’s Firepower 4100 Series shows what’s happening on the network so that you can act faster in the face of a cyber attack
2. Firewall
Cisco’s AnyConnect Secure Mobility Client empowers remote workers with highly secure access to @Αpollo’s network from any device, at any time, in any location.
3. VPN
Cisco’s AMP provides next-generation endpoint protection, scanning and constantly monitoring files for malicious behavior
4. Antimalware
The names, email address and phone numbers of over three million hotel guest.
weakness in the platforms security practices.
Weaknesses in the platform’s security practices
The names, email address and phone numbers of over three million hotel guests.
Weaknesses in the platform’s security practices.
The names, email address and phone numbers of over three million hotel guests.
Weaknesses in the platform’s security practices.
The hotel chain’s reputation.
1. White hat
2. Black hat
3. White hat
4. Black hat
5. Gray hat
Scenero 1. The names, email address and phone numbers of over three million hotel guests.
Scenero 2. Weaknesses in the platform’s security practices.
1) The names, email address and phone numbers of over three million hotel guests.
2) Weaknesses in the platform’s security practices.
Scenario 1: The names, email address and phone numbers of over three million hotel guests.
Scenario 2: Bypassing the platform’s access control methods
1 . White hat
2. Black hat
3. Gray hat
4. Black hat
5. White hat
1. The names, email address and phone numbers of over three million hotel guests.
2. Weaknesses in the platform’s security practices.
Scenerio 1 Answer: The names, email address and phone numbers of over three million hotel guests.
Scenerio 2 Answer: Weaknesses in the platform’s security practices.
Scenario 1
The card payment information of over three million guests.
Scenario 2
Weaknesses in the platform’s security practices.
scenario 1
The card payment information of over three million guests.
scenario 2
Weaknesses in the platform’s security practices.
First scenario:
The hotel chain’s reputation
Second scenario:
Weaknesses in the platform’s security practices.
1. White hat
2. Black hat
3. White hat
4. Black hat
5. Gray hat
For the second scenario, the hackers exploited Weaknesses in the platform’s security practices.
For the first scenario, the hackers took The names, email address and phone numbers of over three million hotel guests.
1. After hacking into ATM systems remotely using a laptop, this attacker worked with the ATM manufacturers to resolve the identified security vulnerabilities.
• White hat
2. This attacker transferred $10 million into their bank account using customer account and PIN credentials gathered from recordings.
• Black hat
3. This attacker’s job is to identify weaknesses in a company’s computer system.
Please select an option
• Gray hat
• Black hat
• White hat
4. This attacker used malware to compromise a company’s system and steal credit card information that was then sold to the highest bidder.
• Black hat
5. While carrying out some research, this attacker stumbled across a security vulnerability on an organization’s network that they are authorized to access.
• White hat
For the second scenario, the answer is “Weaknesses in the platform’s security practices.”
The names, email address and phone numbers of over three million hotel guests
The names, email address and phone numbers of over three million hotel guests.
Weaknesses in the platform’s security practices.
Scenario 1: The names, email address and phone numbers of over three million hotel guests.
Scenario 2: Weaknesses in the platform’s security practices.
Scenario 1: The names, email address and phone numbers of over three million hotel guests.
Scenario 2: Weaknesses in the platform’s security practices.
The names, email address and phone numbers of over three million hotel guests.
Weaknesses in the platform’s security practices.
The names, email address and phone numbers of over three million hotel guests.
The names, email address and phone numbers of over three million hotel guests
Weaknesses in the platform’s security practices.
Grey Hat
Black Hat
White Hat
Black Hat
Grey Hat
The names, email address and phone numbers of over three million hotel guests.
Weaknesses in the platform’s security practices
The names, email address and phone numbers of over three million hotel guests
Day 2 : What Colour is my HAT.
1. What hat
2. Black hat
3. White hat
4. Black hat
5. Gray hat
1. Gray hat
2. Black hat
3. White hat
4. black hat
5. White hat
Scenario I
The card payment information of over three million guests.
Scenario 2
Weaknesses in the platform’s security practices.
The names, email address and phone numbers of over three million hotel guests.
DAY2.
What color is my Hat.
1) White Hat.
2) Black Hat
3) White Hat
4) Black Hat
5) Gray Hat
Scenario 2.
Weaknesses in the platforms security practices
Scenario 1
The names, email address and Phone numbers of over three Million hotel guests.
Day 2: What colour is my hat?
1. White
2. Black
3. Grey
4. Black
5. White
Scenario 2
Weaknesses in the platform’s security practices.
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
1. Grey
2. Black
3. White
4. Black
5. White
Day 2
What Colour is my Hat?
1) White Hat
2) Black Hat
3) White Hat
4) Black Hat
5) Gray Hat
SCENERIO 1
The hotels reputation
the card payment information of over 3 million guests
SCENERIO 2
Extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer.
Taking advantage of student information not being correctly validated on the platform.
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices.
The hotel chain’s reputation.The hotel chain’s reputation.
Weaknesses in the platform’s security practices.
Scenario 2
Weaknesses in the platform’s security practices.
White hat
Black hat
White hat
Black hat
Gray hat
3. The hotel chain’s reputation.
Scenrio 1
The names, email address and phone numbers of over three million hotel guests
Scenerio 2
Weaknesses in the platform’s security practices.
The names, email address and phone numbers of over three million hotel guests.
Weaknesses in the platform’s security practices.
DAY 2
1-WHITE HAT
2- BLACK HAT
3- GRAY HAT AND WHITE HAT
4-GRAY HAT
5- WHITE HAT
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer.
The username and password of all of the hotel’s employees.
Weaknesses in the platform’s security practices.
Day2
What Color Is My Hat?
1. White hat
2. Black hat
3. Gray hat
4. Black hat
5. White hat
Bypassing the platform’s access control methods
Weaknesses in the platform’s security practices
Weaknesses in the platform’s security practices.
The names, email address and phone numbers of over three million hotel guests.
Day2
What Color Is My Hat?
1. White hat
2. Black hat
3. Gray hat
4. Black hat
5. White hat
day 2
Gray hat
2. Black hat
3. White hat
4. Gray hat
5. White hat
Black hat
White hat
Black hat
White ha
1.
The names, email address and phone numbers of over three million hotel guests.
Scenario 2.
Extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer.
1. Gray hat
2. Black hat
3. White hat
4. Black hat
5. White hat
1. White hat
2. Black hat
3. White hat.
4. Gray hat
White hat
Black hat
White hat
Grey hat
White. Hat
The card payment information of over three million guests.
Weaknesses in the platform’s security practices.
1. Gray hat
2. Black hat
3. White hat
4. Black hat
5. White hat
Grey hat
Black hat
White hat
Black hat
White hat
1. White Hat
2. Black Hat
3. Gray Hat
4. Black Hat
5. Gray Hat
Day 2 Assignment…
1. Gray Hat
2. Black Hat
3. White Hat
4. Gray Hat
5. White Hat
Weaknesses in the platform’s security practices.
The card payment information of over three million guests.
1. Gray hat
2. Black hat
3. White hat
4. Black hat
5. Gray hat
Day 2 Assignment
1. Gray hat
2. Black hat
3. White hat
4. Black hat
5. White hat
Scenario I
Gray hat
Scenario 2
Black hat
Scenario 3
White hat
Scenario 4
Black hat
Scenario 5
White hat
1.white hat
2.black hat
3.white hat
4.Black hat
5.Gray hat
The names, email address and phone numbers of over three million hotel guests.
Weaknesses in the platform’s security practices.
Scenario1: white hat
Scenario2: black hat
Scenario3: white hat
Scenario4: black hat
Scenario5: Gray hat
1.White hat.
2.Black hat
3.white hat
4.Black hat
5.white hat
Scenario 1:The names,email and phone numbers of over three million hotel guests
Scenario 2: weakness in the platform’s security services
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices.
1.White hat
2.Black hat
3.Gray hat
4. Black hat
5. White hat
Scenario I
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices.
1. Gray hat
2. Black hat
3. White hat
4. Black hat
5. White hat
1. White hat
2. Black hat
3. Gray hat
4. Black hat
5. White hat
1. White hat
2. Black hat
3. White hat
4. Black hat
5. White hat
1. The names, email address and phone numbers of over three million hotel guests.
2. Weaknesses in the platform’s security practices
Day 2 Discussion Assignment
1. Gray hat
2. Black hat
3. White hat
4. Black hat
5. White hat
1.White hat
2.Black hat
3.White hat
4.Gray hat
5.White hat
The card payment information of over three million guests.
Taking advantage of student information not being correctly validated on the platform.
1. After hacking into ATM systems remotely using a laptop, this attacker worked with the ATM manufacturers to resolve the identified security vulnerabilities.
*Gray hat
2. This attacker transferred $10 million into their bank account using customer account and PIN credentials gathered from recordings.
*Black hat
3. This attacker’s job is to identify weaknesses in a company’s computer system.
*White hat
4. This attacker used malware to compromise a company’s system and steal credit card information that was then sold to the highest bidder.
*Black hat
5. While carrying out some research, this attacker stumbled across a security vulnerability on an organization’s network that they are authorized to access.
*White hat
Day 2 Scenario Answers:
1. Gray Hat
2. Black Hat
3. White Hat
4. Black Hat
5. White Hat
1. After hacking into ATM systems remotely using a laptop, this attacker worked with the ATM manufacturers to resolve the identified security vulnerabilities.
White hat
2. This attacker transferred $10 million into their bank account using customer account and PIN credentials gathered from recordings.
Black hat
3. This attacker’s job is to identify weaknesses in a company’s computer system.
Gray hat
4. This attacker used malware to compromise a company’s system and steal credit card information that was then sold to the highest bidder.
Black hat
5. While carrying out some research, this attacker stumbled across a security vulnerability on an organization’s network that they are authorized to access.
White hat
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices.
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2.
Weaknesses in the platform’s security practices.
1. After hacking into ATM systems remotely using a laptop, this attacker worked with the ATM manufacturers to resolve the identified security vulnerabilities.
Answer: White
2. This attacker transferred $10 million into their bank account using customer account and PIN credentials gathered from recordings.
Answer: Black
3. This attacker’s job is to identify weaknesses in a company’s computer system.
Answer: White
4. This attacker used malware to compromise a company’s system and steal credit card information that was then sold to the highest bidder.
Answer: Black
5. While carrying out some research, this attacker stumbled across a security vulnerability on an organization’s network that they are authorized to access.
Answer: White
The hotel chain’s reputation.
Scenario 1. The names, email address and phone numbers of over three million hotel guests.
Scenario 2. Weaknesses in the platform’s security practices.
Scenario 1: The names, email address and phone numbers of over three million hotel guests.
Scenario 2: Weaknesses in the platform’s security practices
scenario1.The names, email address and phone numbers of over three million hotel guests..
secnario2.Weaknesses in the platform’s security practices.
SCENERIO 1
The names, email address and phone numbers of over three million hotel guests.
SCENRIO 2
Extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer.
SCENARIO 1
The card payment information of over three million guests.
SCENARIO 2
Weaknesses in the platform’s security practices.
SCENARIO 1
The names, email address and phone numbers of over three million hotel guests.
SCENARIO 2
Weaknesses in the platform’s security practices.
SCENARIO 1
Taking advantage of student information not being correctly validated on the platform.
SCENARIO 2
Weaknesses in the platform’s security practices.
Scenario 1: The names, email address and phone numbers of over three million hotel guests.
Scenario 2: Weaknesses in the platform’s security practices.
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices.
Scenerio 1. The names, email address and phone numbers of over three million hotel guests.
Scenerio 2. Weaknesses in the platform’s security practices.
The names, email address and phone numbers of over three million hotel guests
Weaknesses in the platform’s security practices
Scenario 1”
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices.
Scenario 1
The hotel chain’s reputation.
Scenario 2
Weaknesses in the platform’s security practices.
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weakness in the platform’s security practices.
Answer 1
The names, email address and phone numbers of over three million hotel guests.
Answer 2
Weaknesses in the platform’s security practices.
Scenario 1
The names , email address and phone numbers of over three million hotel guests .
Scenario 2
Weakness in the platform’s security practices
Scenario 1..
The names, email address and phone numbers of over three million hotel guests.
Scenario 2….
Weaknesses in the platform’s security practices.
Scenerio 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices.
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices.
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices.
Scenerio 1:The names, email address and phone numbers of over three million hotel guests
Scenerio 2: Weakness in the platform’s security practices
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenerio 2
Weaknesses in the platform’s security practices.
Scenario 1:The names, email address and phone numbers of over three million hotel guests.
Scenario 2:
Weaknesses in the platform’s security practices.
Scenario 2: Weaknesses in the platform’s security practices
Scenario 2. Answer – Weaknesses in the platform’s security practices.
Scenario 1: The names, email address and phone numbers of over three million hotel guests.
Scenario 2: Weaknesses in the platform’s security practices.
Scenario 1: The names, email address and phone numbers of over three million hotel guests.
Scenario 2: Weaknesses in the platform’s security practices.
No 1.The names, email address and phone numbers of over three million hotel guests.
No 2.Weaknesses in the platform’s security practices.
The names, email address and phone numbers of over three million hotel guests.
Weaknesses in the platform’s security practices.
Scenario 1: The names, email address and phone numbers of over three million hotel guests. But ultimately, the reputation of the hotel chain has been compromised because both affected and none affected customers will find it difficult trusting them to keep their personal informations safe.
Scenario 2: Weaknesses in the platform’s security practices.
Scenario 1. Answer – 3. The hotel chain’s reputation.
First Scenario: The card payment information of over three million guests.
Second Scenario: Weaknesses in the platform’s security practices.
1st Scenario-The names, email address and phone numbers of over three million hotel guests.
2nd Scenario-Weaknesses in the platform’s security practices.
Scenario 1: The names, email address and phone numbers of over three million hotel guests.
Scenario 2: Taking advantage of student information not being correctly validated on the platform.
1st Scenario – The hotel chain’s reputation
2nd Scenario – Weaknesses in the platform’s security practices.
Scenario 1: The hotel chain’s reputation
Scenario 2: Bypassing the platform’s access control methods.
1. White Hat
2. Black Hat
3. White Hat
4. Gray Hat
5. White hate
Internal
invite malware onto the organization’s network by clicking on malicious emails or websites
External
use social engineering to gain unauthorized access to organizational data.
1. White hat
2. Black hat
3. White hat
4. Black hat
5. Gray hat
Bypassing the platform’s access control methods.
Scenario 2
Weaknesses in the platform’s security practices.
For scenario 1:
The card payment information of over three million guests.
The names, email address and phone numbers of over three million hotel guests.
The hotel chain’s reputation.
Scenario 2:
Weaknesses in the platform’s security practices.
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
The hotel chain’s reputation.
Scenario 1
The card payment information of over three million guests.
The names, email address and phone numbers of over three million hotel guests.
The hotel chain’s reputation.
Scenario 2
Weaknesses in the platform’s security practices.
Bypassing the platform’s access control methods.
SCENARIO 1
The card payment information of over three million guests.
The names, email address and phone numbers of over three million hotel guests.
The hotel chain’s reputation.
SCENARIO 2
Weaknesses in the platform’s security practices.
Bypassing the platform’s access control methods.
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
The hotel chains reputation
Scenario 2
Weaknesses in the platform’s security practices.
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices.
The names, email address and phone numbers of over three million hotel guests
Weaknesses in the platform’s security practices.
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices.
First Scenario
The names, email address and phone numbers of over three million hotel guests.
Second Scenario
Weaknesses in the platform’s security practices.
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices
Scenario1:
The hotel chain’s reputation.so the hackers have access to there personal information.
Scenario2:
The username and password of all of the hotel’s employee.
Scenrio 1:
The names, email address and phone numbers of over three million hotel guests.
Scenrio 2:
Weaknesses in the platform’s security practices.
Scenario1.
The hotel chain’s reputation.so the hackers have access to there personal information.
Scenario2.
The username and password of all of the hotel’s employee.
4.The username and password of all of the hotel’s employee
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices
scenario 1
Scenario 2
Weaknesses in the platform’s security practices.
Scenario 2
Extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer.
The names, email address and phone numbers of over three million hotel guests.
Scenario 1
The hotel chain’s reputation
For senecio 1
The card payment information of over three million guests.
For secenrio 2
Taking advantage of student information not being correctly validated on the platform.
for scenerio 1
The card payment information of over three million guests
for scenerio two
Weaknesses in the platform’s security practices.
The names, email address and phone numbers of over three million hotel guests.
Weaknesses in the platform’s security practices.
The names, email address and phone numbers of over three million hotel guests. The names, email address and phone numbers of over three million hotel guests.
Weaknesses in the platform’s security practices.
for scenerio 1
The card payment information of over three million guests
for scenerio two
Weaknesses in the platform’s security practices.
For scenario 1,
The names, email address and phone numbers of over three million hotel guests
For scenario 2,
Weaknesses in the platform’s security practices.
Answer to scenario 1
The names, email address and phone numbers of over three million hotel guests.
Answer to scenario 2
Weaknesses in the platform’s security practices.
3.Weaknesses in the platform’s security practices.
1.The card payment information of over three million guests.
2.The names, email address and phone numbers of over three million hotel guests.
1.The names, email address and phone numbers of over three million hotel guests
Scenerio 2
Taking advantage of student information not being correctly validated on the platform.
Related
Scenario 1 – The names, email addresses and phone numbers of over three million hotel guests
Scenario 2 – Weaknesses in the platform’s security practices.
Gray Hat
Black Hat
White Hat
Gray Hat
Gray Hat
Scenario 1 – The names, email address and phone numbers of over three million hotel guests
Scenario 2 – Weaknesses in the platform’s security practices.
Symptoms of Malware:-
modified or deleted files
the presence of unknown files, programs or desktop icons
unknown processes running
programs turning off or reconfiguring themselves
The names, email address and phone numbers of over three million hotel guests.
Extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer.
You’ve logged into your laptop but it contains some photos belonging to the previous user, who no longer works at DEXA Your line manager asks you to delete them. You drag the photos into the recycle bin, open the recycle bin, select them and click ‘Delete’ once again. That should do it!
Do you think the photos are really gone from the laptop?
Select the correct answer, then Submit.
❌ Yes, the photos can no longer be retrieved.
✅ No, the photos are just inaccessible from the operating system.
Think about it? What’s your answer?
My answer is option B. No, the photos are just inaccessible from the operating system.
Scenario 1: The names, email address and phone numbers of over three million hotel guests.
Scenario 2: Weaknesses in the platform’s security practices.
1. White Hat
2. Black Hat
3. Gray Hat
4. Black Hat
5. Gray Hat
Internal
invite malware onto the organization’s network by clicking on malicious emails or websites
External
use social engineering to gain unauthorized access to organizational data.
Scenerio 1
The names, email address and phone numbers of over three million hotel guests.
Scenerio 2
Weaknesses in the platform’s security practices.
Weaknesses in the platform’s security practices.
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices.
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices.
Weaknesses in the platform’s security practices.
The names, email address and phone numbers of over three million hotel guests.
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices.
1. The card payment information of over three million guests.
2. The names, email address and phone numbers of over three million hotel guests.
3. The hotel chain’s reputation.
The username and password of all of the hotel’s employees
1. Weaknesses in the platform’s security practice
2. Bypassing the platform’s access control methods.
3. Taking advantage of student information not being correctly validated on the platform
Cyber Attacks
1. white hat
2. black hat
3.white hat
4.gray hat
5.white hat
OGE CHINWEZE
TEAM 5
Scenario 1
Ans – The username and password of all of the hotel’s employees.
Scenario 2
Ans – Weaknesses in the platform’s security practices.
1.white hat
2. black hat
3.white hat
4.gray hat
5.white hat
Questions on Cyber Attackers Section
1. Gray hat
2. Black hat
3. White hat
4. Black hat
5. White hat
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices.
The hotel chain’s reputation.
Weaknesses in the platform’s security practices.
The username and password of all of the hotel’s employees.
Weaknesses in the platform’s security practices.
JESUDIMU OPEYEMI
TEAM 4
COHORT 5
Scenario 1
The hotel chain’s reputation.
The fact that the hacker was able to penetrate or access the customer’s details there was no record of whether the hacker targeted any customers but for the hacker to gain access, it affected the chain reputation of the hotel. Customers will not be able to trust the hotel with their information so therefore it will affect them.
Scenario 2
Weaknesses in the platform’s security practices
The hacker was able to access the student’s information by going through the vulnerabilities of the most weakened security practices. This can be informed of a compromised user’s details or their details are not gathered not through encrypted means. so the weakness in the security practices was used to access the student’s information.
2) Bypassing the platform’s access control methods.
* White hat
* Black hat
* Gray hat
* Black hat
* White hat
For scenario 1:
Ans: The names, email address and phone numbers of over three million hotel guests
For scenario 2:
Ans: Weaknesses in the platform’s security practices.
Scenario 2
Weaknesses in the platform’s security practices.
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 1 answer
The names, email address and phone numbers of over three million hotel guests.
Scenario 2 answer
. Weaknesses in the platform’s security practices.
* The card payment information of over three million guests.
* Weaknesses in the platform’s security practices.
(1) The names, email address and phone numbers of over three million hotel guests.
(2) Bypassing the platform’s access control methods.
Onibokun Adetona Oluwaseun. Team 1
(1)The names, email address and phone numbers of over three million hotel guests.
1. After hacking into ATM systems remotely using a laptop, this attacker worked with the ATM manufacturers to resolve the identified security vulnerabilities.
Gray hat
2. This attacker transferred $10 million into their bank account using customer account and PIN credentials gathered from recordings.
Black hat
3. This attacker’s job is to identify weaknesses in a company’s computer system.
White hat
4. This attacker used malware to compromise a company’s system and steal credit card information that was then sold to the highest bidder.
Black hat
5. While carrying out some research, this attacker stumbled across a security vulnerability on an organization’s network that they are authorized to access.
Gray hat
1. The names, email address and phone numbers of over three million hotel guests.
2. Weaknesses in the platform’s security practices.
1. After hacking into ATM systems remotely using a laptop, this attacker worked with the ATM manufacturers to resolve the identified security vulnerabilities.
Please select an option
Gray hat
1. The names, email address and phone numbers of over three million hotel guests
2. Weaknesses in the platform’s security practices.
ADAOBI OBI
Answers:
1. The names, email address and phone numbers of over three million hotel guests
2. Weaknesses in the platform’s security practices.
I am also considering – Extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer.
Q1. White Hat
Q2. Black Hat
Q3. Grey Hat
Q4. Black Hat
Q5. Grey Hat
Weaknesses in the platform’s security practices.
The names, email address and phone numbers of over three million hotel guests
Assignment on cyber security hackers
Question 1
The username and password of all of the hotel’s employees.
Question 2
Weaknesses in the platform’s security practices.
Assignment on Cyber Attackers
Question 1
Gray hat
Question 2
Black hat
Question 3
White hat
Question 4
Black hat
Question 5
White hat
Assignment 2
Question 1 – GRAY HAT
Question 2- BLACK HAT
Question 3 – WHITE HAT
Question 4 – BLACK HAT
Question 5 – GRAY HAT
On Cyber attackers
The answers.
1. White hat (option 3)
2. Black hat (option 2)
3. Gray hat (option 1 )
4. Gray hat (option 1 )
5. White hat ( option 3 )
Scenario 1
Answer:The names,email address and phone numbers of over three million hotel guests.
Scenario 2
Answer:Weaknesses in the platform’s security practices.
Scenario 1
The hotel chain’s reputation.
Scenario 2
Weaknesses in the platform’s security practices.
Assignment2:
1. Gray hat
2. Black hat
3. White hat
4. Black hat
5.White hat
Scenario 1.
The names, email address and phone numbers of over three million hotel guests.
Scenario 2.
Weaknesses in the platform’s security practices.
Scenario 1
The hotel chain’s reputation
Scenario 2
Weaknesses in the platform’s security practices
scenario 1
The hotel chain’s reputation.
scenario 2
Weaknesses in the platform’s security practices.
Scenario 2: Weaknesses in the platform’s security practices.
Scenario 1
The username and password of all of the hotel’s employees.
Scenerio 2
Weaknesses in the platform’s security practices.
Scenario 1: The names, email address and phone numbers of over three million hotel guests.
Scenario 2: Weakness in the platforms security services
Scenerio 1
The names, email address and phone numbers of over three million hotel guests
Scenerio 2
Weakness in the platform security practices
Scenario 1: The names, email address, and phone numbers of over three million hotel guests.
Scenario 2: Weaknesses in the platform’s security practices.
Scenario 1 hotel’s chain reputation scenario 2 weakness in the platform’s security system
Scenario2
Weaknesses in the platform’s security practices.
Scenario 1: The names, email address and phone numbers of over three million hotel guests.
Scenario 2: Weakness in the platforms security services
First scenario
The names, email address and phone numbers of over three million hotel guests.
Second scenario
Weaknesses in the platform’s security practices.
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices.
The names, email address and phone numbers of over three million hotel guests.
Scenario 1: The names, email address and phone numbers of over three million hotel guests.
Scenario 2: Weaknesses in the platform’s security practices.
Scenario 2: Weaknesses in the platform’s security practices.
Scenario 1: The names, email address and phone numbers of over three million hotel guests.
Scenario 2: Weaknesses in the platform’s security practices.
Scenario 1: The names, email address and phone numbers of over three million hotel guests
Scenario 1 -T he names, email address and phone numbers of over three million hotel guests.
Scenario 2 – Weaknesses in the platform’s security practices.
Scenario 1: The names, email addresses, and phone numbers of over three million hotel guests.
Scenario 2: Weaknesses in the platform’s security practices.
Scenario 1:
Answer: The names, email address and phone numbers of over three million hotel guests.
Scenario 2:
Answer: Weaknesses in the platform’s security practices.
Scenario 1 company reputation Scenario 2 weakness in the platform’s security practice
1. The names, email address and phone numbers of over three million hotel guests
2. Weaknesses in the platform’s security practices.
Question 1:
The names, email address and phone numbers of over three million hotel guests.
Question 2:
Weaknesses in the platform’s security practices.
First Scenerio,
I believe that what the hackers went for in the first scenerio was, The names, email address and phone numbers of over three million hotel guests.
Second scenerio
My answer to it is, Weaknesses in the platform’s security practices.
First Scenerio
I think the hacker basically went for The names email address and phone numbers of 3 million hotel guests…
Second Scenerio
Weaknesses in the platform’s security practices.
senario 1
The names, email address and phone numbers of over three million hotel guests.
senario 2
Weaknesses in the platform’s security practices
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices.
Weaknesses in the platform’s security practices. Scenario 2
The names, email address and phone numbers of over three million hotel guests.
Weaknesses in the platform’s security practices.
Scenario 2
The names, email address and phone numbers of over three million hotel guests.
Scenario 1
The names, email address and phone numbers of over three million hotel guests
Scenario 2
Weaknesses in the platform’s security practices.
Answer to Number 2. Weaknesses in the platform’s Security practices.
Answer to the first senerio:-No 2. The names, email address and phone numbers of over three million hotel guests.
Answer to the Second senerio:- No 1.
1. The names, email address and phone numbers of over three million hotel guests.
2. Weaknesses in the platform’s security practices.
Answer to senario 1
The names, email address and phone numbers of over three million hotel guests.
Answer to senario 2
Weaknesses in the platform’s security practices
Scenario 1
The hotel chain’s reputation.
Scenario 2
Taking advantage of student information not being correctly validated on the platform.
Weaknesses in the platform’s security practices.
The names, email address and phone numbers of over three million hotel guests.
1. The names, email address and phone numbers of over three million hotel guests.
2. Weaknesses in the platform’s security practices.
Weaknesses in the platform’s security practices
The names, email address and phone numbers of over three million hotel guests.
Scenario 1
The hotel chain’s reputation.
Scenario 2
Bypassing the platform’s access control methods.
Weaknesses in the platform’s security practices.
The card payment information of over three million guests.
Weaknesses in the platform’s security practices.
Scenerio 2
Weaknesses in the platform’s security practices.
The card payment information of over three million guests.
The username and password of all of the hotel’s employees.
Scnario A: The names, email address and phone numbers of over three million hotel guests.
Scearo B: Weaknesses in the platform’s security practices.
Scenario 1:
The hotel chain’s reputation.
Scenario 2:
Weaknesses in the platform’s security practices.
Scenario 1
The card payment information of over three million guests.
Scenario 2
Weaknesses in the platform’s security practices.
Scenario 1; The names, email address and phone numbers of over three million hotel guests.
Scenario 2; Weaknesses in the platform’s security practices.
Scenario 1. The names, email address and phone numbers of over three million hotel guests.
Scenario 2. Weaknesses in the platform’s security practices.
IdiwoguUjunwa
Scenario 1:
The names, email address and phone numbers of over three million hotel guests.
Scenario 2:
Weaknesses in the platform’s security practices.
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices
The names, email address and phone numbers of over three million hotel guests
Weaknesses in the platform’s security practices.
1. The hotel chain’s reputation.
2. Weaknesses in the platform’s security practices.
Sennario 1
The names, email address and phone numbers of over three million hotel guests
The names, email address and phone numbers of over three million hotel guests.
The names,email address and phone numbers of over three million hotel guests.
The names, email address and phone numbers of over three million hotel guests.
Scenario 1
The names, email address and phone numbers of over three million hotel guests
Scenario 2: Weaknesses in the platform’s security practices.
2. Weaknesses in the platform’s security practices.
1.The names, email address and phone numbers of over three million hotel guests.
1) The names, email address and phone numbers of over three million hotel guests.
2)Weaknesses in the platform’s security practices.
Scenario 1: The names, email address and phone numbers of over three million hotel guests.
Scenario 2: Weaknesses in the platform’s security practices.
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices.
Scenario 1
The hotel chain’s reputation
Scenario 2
Weaknesses in the platform’s security practices
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices.
Weaknesses in the platform’s security practices.
The names, email address and phone numbers of over three million hotel guests
scenario 1: The names, email address and phone numbers of over three million hotel guests.
scenario 2: Weaknesses in the platform’s security practices.
Paul Nweke
1. White hat
2. Black hat
3. Gray hat
4. Black hat
5. Gray hat.
Paul Nweke
Scenario 1: The names, email address and phone numbers of over three million hotel guests.
Scenario 2: Weaknesses in the platform’s security practices.
Paul Nweke
The names, email address and phone numbers of over three million hotel guests.
1. White Hat
2. Black Hat
3. White Hat
4. Black Hat
5. White Hat
Scenario 1. The hotel chain’s reputation.
Scenario 2. Weaknesses in the platform’s security practices.
1. The hotel chain’s reputation.
2. Weaknesses in the platform’s security practices.
Scenario 1
The card payment information of over three million guests.
Scenario 2
Weaknesses in the platform’s security practices.
scenario 2
1. White hat
2. Black hat
3. White hat
4. Gray hat
5. White hat
The names, email address and phone numbers of over three million hotel guests.
Weaknesses in the platform’s security practices
The names, email address and phone numbers of over three million hotel guests.
The names, email address and phone numbers of over three million hotel guests.
I honestly cannot understand why you’d ever want to run IPv6 internal I have IPv4 and IPv6 to my router Internally everything is IPv4 Nothing is routable unless I want it to be IPv4 is so much easier to remember, reason about, and router internally
Scenario two
Weaknesses in the platform’s security practices.
Scenario one
The card payment information of over three million guests.
The first caxse :The hotel chain’s reputation.
Weaknesses in the platform’s security practices.
1. Gray
2. Black
3. White
4. Black
5. White
Weaknesses in the platform’s security practices.
The names, email address and phone numbers of over three million hotel guests
Weaknesses in the platform’s security practices.
Scenario One
The names, email address and phone numbers of over three million hotel guests.
Scenario Two
Weaknesses in the platform’s security practices.
1. Gray hat
2. Black hat
3. White hat
4. Gray hat
5. White hat
Scenario One
The username and password of all of the hotel’s employees.
Scenario Two
Weaknesses in the platform’s security practices.
Scenario 1
The names, email address and phone numbers of over three million hotel guests
Scenario 2
Weaknesses in the platform’s security practices.
Scenario 1
The hotel chain’s reputation.
Scenario 2
Weaknesses in the platform’s security practices.
1. The names, email address and phone numbers of over three million hotel guests.
2. Weaknesses in the platform’s security practices.
Router
Firewall
VPN
Antimalware
Weaknesses in the platform’s security practices.
The names, email address and phone numbers of over three million hotel guests.
What Color Is My Hat?
1. White Hat
2. Black Hat
3. White Hat
4. Black Hat
5. White Hat
Scenario 1
The card payment information of over three million guests.
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices.
Scenario 3
Scenario 1….The card payment information of over three million guests
Scenario 2…
Scenario 1
The hotel chain’s reputation.
Scenario 2
Weaknesses in the platform’s security practices.
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices.
Scenario 1:-The names, email address and phone numbers of over three million hotel guests
Scenario 2: Weaknesses in the platform’s security practices.
1. Gray hat
2. Black hat
3. White hat
4. Gray hat
5. White hat
Scenario 1: The names, email address and phone numbers of over three million hotel guests.
Scenario 2: Weaknesses in the platform’s security practices.
Scenario 1: The names, email address and phone numbers of over three million hotel guests.
Scenario 2: Weaknesses in the platform’s security practices.
Day 2
1. White hat
2. Black hat
3. Gray hat
4. Black hat
5. White hat
Weaknesses in the platform’s security practices.
Answer to Scenario 1: The names, email address and phone numbers of over three million hotel guests.
Answer to Scenario 2: Weaknesses in the platform’s security practices.
The card payment information of over three million guests.
Weaknesses in the platform’s security practices.
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s Security practices
Scenario 1: the hackers took;
The names, email address and phone numbers of over three million hotel guests.
The username and password of all of the hotel’s employees.
Scenario 2: the hackers exploits;
Weaknesses in the platform’s security practices.
The names, email address and phone numbers of over three million hotel guests.
Weaknesses in the platform’s security practices.
1. White hat
2. Black hat
3. White hat
4. Gray hat
5. White hat
Question 1:The card payment information of over three million guests., The names, email address and phone numbers of over three million hotel guests and The username and password of all of the hotel’s employees.
Question 2: Weaknesses in the platform’s security practices.
1. White
2. Black
3. White
4. Black
5. White
Question 1
The names, email address and phone numbers of over three million hotel guests.
Question 2
Weaknesses in the platform’s security practices.
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scénario 2
Weaknesses in the platform’s security practices.
Scenario 1.
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
1. Weaknesses in the platform’s security practices.
By: Olalekan
Day 2 Answers – Cyber Attackers
1. Gray hat
2. Black hat.
3. White hat
4.Black hat
5. White hat.
The names, email address and phone numbers of over three million hotel guests.
Weaknesses in the platform’s security practices.
Day 2 answers.
1. Gray hat
2. Black hat.
3. White hat
4.Black hat
5. White hat.
Scenario 1. The hotel chain’s reputation.
Scenario 2. Weaknesses in the platform’s security practices.
Scenario 1 (The Hotel)
2. The names, email address and phone numbers of over three million hotel guests.
Scenario 2 (e-learning platform at risk)
1. Weaknesses in the platform’s security practices.
1. White
2. Black
3. White
4. Black
5. Black
Day 2 Answer:
1) Gray hat
2) Black hat
3) White hat
4) Black hat
5) White hat
Scenario 1
The names, email addresses and phone numbers of over 3 million hotel people
Scenario 2
Weakness in platform security practices
Scenario 1
Personal details of hotel guests which includes emails, names and addresses
Scenario 2
Security platform not safe but weak
Scenario 1 answer:
2. The names, email address and phone numbers of over three million hotel guests.
Scenario 2 answer:
Weaknesses in the platform’s security practices.
Scenario 1 Answer:
The names, email address and phone numbers of over three million hotel guests.
Scenario 2 Answer:
Weaknesses in the platform’s security practices.
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices.
DORIS OGOCHUKWU
1.The names, email address and phone numbers of over three million hotel guests.
2.Weaknesses in the platform’s security practices
Scenerio 2 answer
Weaknesses in the platform’s security practices.
The names, email address and phone numbers of over three million hotel guests.
Day 2
White hat
Black hat
Gray hat
Black hat
Gray hat
Day 1
– Scenario 1
The names, email addresses, and phone numbers of over three million hotel guests.
– Scenario 2
Weaknesses in the platform’s security practices.
The names, email address and phone numbers of over three million hotel guests.
Weaknesses in the platform’s security practices.
1. The names, email address and phone numbers of over three million hotel guests
2. Weaknesses in the platform’s security practices.
The names, email address and phone numbers of over three million hotel guests.
2. Weaknesses in the platform’s security practices
1. The names, email address and phone numbers of over three million hotel guests.
2. Weaknesses in the platform’s security practices.
White hat
Black hat
Gray hat
Black hat
Gray hat
Weaknesses in the platform’s security practices.
The names, email address and phone numbers of over three million hotel guests.
1 The names, email address and phone numbers of over three million hotel guests.
2 Weaknesses in the platform’s security practices.
1. Gray hat
2. Black hat
3. White hat
4. Black hat
5. White hat
1. The username and password of all of the hotel’s employees.
2. Weaknesses in the platform’s security practices.
1.The names, email address and phone numbers of over three million hotel guests.
2.Weaknesses in the platform’s security practices
Bolaji
Group 2
Day 2 quiz answers
1. White hat
2. Black hat
3. White hat
4. Grey hat
5. Black hat
1. The names, email address and phone numbers of over three million hotel guests.
2. Weaknesses in the platform’s security practices
1.The names, email address and phone numbers of over three million hotel guests.
2.Weaknesses in the platform’s security practices
Day 2 quiz answers;
1. White hat
2. Black hat
3. White hat
4. Gray hat
5. White hat
1.The names, email address and phone numbers of over three million hotel guests.
2.Weaknesses in the platform’s security practices
Day 2 Quiz Answers
1. White hat
2. Black hat
3. White hat
4. Gray hat
5. White hat
Day 2 quiz
1. Gray hat
2. Black hat
3. White hat
4. Black hat
5. Gray hat
Day 2
White hat
Black hat
White hat
Gray hat
White hat
Day 2
White hat
Black hat
White hat
Gray hat
White hat
Module 1
Scenario 1 (The Hotel)
The names, email address and phone numbers of over three million hotel guests.
Scenario 2 (The E-learning platform @ risk)
Weaknesses in the platform’s security practices.
Day 1
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices.
Day 2
White hat
Black hat
White hat
Gray hat
White hat
Day 2;
1. White hat
2. Black hat
3. Gray hat
4. Black hat
5. Gray Hat
Day 2
1. Gray
2. Black
3. Gray
4. Black
5. White
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices.
Day 1
Scenario 2
The names, email addresses, and, phone numbers of over three million hotel guests
Scenario 2
Weaknesses in the platform’s security practices.
Gray hat
Black hat
White hat
Gray hat
White hat
Day 2
1. Gray hat
2. Black hat
3. White hat
4. Black hat
5. Gray hat
Day 1
Scenario 1
The names, email addresses, and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices.
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices.
Module 2
1. White Hat
2. Black Hat
3. Gray Hat
4. Black Hat
5. White Hat
1. Gray Hat
2. Black Hat
3. White Hat
4. White Hat
5. Black Hat
Scenario 2
Weaknesses in the platform’s security practices.
Day 1
The card payment information of over three million guests.
Question 2
Weaknesses in the platform’s security practices.
1. grey hat
2. black hat
3. white hat
4. black hat
5. white hat
1. White hat
2. Black hat
3. grey
4. Black hat
5. Grey hat
Scenario 1
The names, email addresses and phone numbers of over three million hotel guests.
Day 2
1) White hat
2) Black hat
3) White hat
4) Gray hat
5) White hat
1 white
2 black hat
3 gray hat
4 black hat
5 white hat
Day 2
1. White hat
2. Black hat
3. Gray hat
4. Gray hat
5. White hat
1. White hat
2. Black hat
3. White hat
4. Black hat
5. Grey hat
The hotel chain’s reputation.
Weaknesses in the platform’s security practices.
Scenario 1
The card payment information of over three million guests.
Scenario 2
Weaknesses in the platform’s security practices.
Which color is my hat?
1. Grey Hat.
2. Black Hat.
3. White Hat.
4. Black Hat.
5. Grey Hat.
The username and password of all of the hotel’s employees.
Taking advantage of student information not being correctly validated on the platform.
DAY 2
1. White Hat
2. Black Hat
3. White Hat
4. Gray Hat
5. White Hat
WHITE
GRAY
BLACK
BLACK
GRAY
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
The hotel chain’s reputation
Scenario 2
Weaknesses in the platform’s security practices.
Taking advantage of student information not being correctly validated on the platform.
1. White Hat
2. Black Hat
3. White Hat
4. Gray Hat
5 White Hat
Day 1
1. The names, email address and phone numbers of over three million hotel guests.
2.Weaknesses in the platform’s security practices.
The names, email address and phone numbers of over three million hotel guests.
Weaknesses in the platform’s security practices.
Types of Attackers
1. White hat
2. Black hat
3. Grey hat
4. Black hat
5. Grey hat
1. A= Gray Hat
2. B= Black Hat
3. C=White Hat
4. B=Black Hat
5. A=Gray Hat
1. White hat
2. Black hat
3. White hat
4. Black hat
5. Gray hat
1. Gray hat
2. Black hat
3. White hat
4. Black hat
5. White hat
1. GRAY HAT
2. BLACK HAT
3.WHITE HAT
4. BLACK HAT
5. WHITE HAT
1) Gray hat
2) Black hat
3) white hat
4)Black hat
5)white hat
Scenario 1
The hotel chain’s reputation.
Scenario 2
Weaknesses in the platform’s security practices.
Scenario 1
The hotel chain’s reputation.
Scenario 2
Weaknesses in the platform’s security practices.
Scenario
1 White hat
2 Black hat
3 Gray hat
4 Black hat
5 White hat
Cyber attackers: What color is my hat
1. Gray hat
2. Black hat
3. White hat
4. Black hat
5. White hat
Osemene Nonyelum Esther.
CYBER ATTACKS.
QUESTION I
White hat.
QUESTION 2
Black hat.
QUESTION 3
Gray hat.
QUESTION 4
Black hat.
QUESTION 5
White hat.
Gray Hat
Black Hat
White Hat
Black Hat
Gray Hat
Scenario 1:
1. The card payment information of over three million guests.
2. The names, email address and phone numbers of over three million hotel guests.
Scenario 2:
Weaknesses in the platform’s security practices.
1)The names, email address and phone numbers of over three million hotel guests
2)Weaknesses in the platform’s security practices.
Scenario 1: The names, email address and phone numbers of over three million hotel guests
Scenario 2: Weaknesses in the platform’s security practices.
Weaknesses in the platform’s security practices.
The names, email address and phone numbers of over three million hotel guests.
The hotel chain’s reputation.
SCENARIO 1: The names, email address and phone numbers of over three million hotel guests.
SCENARIO 2: Weaknesses in the platform’s security practices
Weaknesses in the platform’s security practices.
The names, email address and phone numbers of over three million hotel guests.
Weaknesses in the platform’s security practices.
The username and password of all of the hotel’s employees.
Weaknesses in the platform’s security practices.
.Weaknesses in the platform’s security practices.
4.The username and password of all of the hotel’s employees.
SCENARIO 1: The names, email address and phone numbers of over three million hotel guests
SCENARIO 2: Weaknesses in the platform’s security practices.
Scenario 2: Weaknesses in the platform’s security practices.
Scenario 1: The names, email address and phone numbers of over three million hotel guests
Scenario 1
3. The hotel chain’s reputation.
Scenario 2
Weaknesses in the platform’s security practices.
SCENARIO 1:
The names, email address and phone numbers of over three million hotel guests.
SCENARIO 2:
Weaknesses in the platform’s security practices
The card payment information of over three million guests.
Weaknesses in the platform’s security practices.
Scenario 1
The hotel chain’s reputation.
Scenario 2
Weaknesses in the platform’s security practices.
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices.
Scenerio 1
The names, email addresses and phone number of I’ve three million guest.
Scenerio 2
Weaknesses in the platforms security practices
1. The names, email address and phone numbers of over three million hotel guests
2. Weaknesses in the platform’s security practices
The names, email address and phone numbers of over three million hotel guests
Scenario 1
The card payment information of over three million guests.
The names, email addresses and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices.
1. The names, email address and phone numbers of over three million hotel guests
2. Weaknesses in the platform’s security practices.
1.Taking advantage of student information not being correctly validated on the platform.
2.The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices.
Scenario 1
The username and password of all of the hotel’s employees.
The names, email address and phone numbers of over three million hotel guests.
The hotel chain’s reputation
Weaknesses in the platform’s security practices.
Weaknesses in the platform’s security practices.
Extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer.
Bypassing the platform’s access control methods.
Taking advantage of student information not being correctly validated on the platform.
The username and password of all of the hotel’s employees.
The names, email address and phone numbers of over three million hotel guests.
Scenario 1:
The card payment information of over three million guests.
The names, email address and phone numbers of over three million hotel guests.
Scenario 2:
Weaknesses in the platform’s security practices
Scenario 1
The hotel chain’s reputation.
Scenario 2
Weaknesses in the platform’s security practices.
Scenario 1: The names, email address and phone numbers of over three million hotel guests.
Scenario 2: Weaknesses in the platform’s security practices.
Scenario 1: The names, email address and phone numbers of over three million hotel guests.
Scenario 2: Weaknesses in the platform’s security practices.
Weaknesses in the platform’s security practices.
The names, email address and phone numbers of over three million hotel guests
Weaknesses in the platform’s security practices.
Scenario 1: The names, email address and phone numbers of over three million hotel guests
Scenario 2: Weaknesses in the platform’s security practices.
SCENARIO 1:
The names, email address and phone numbers of over three million hotel guests.
SCENARIO 2:
Weaknesses in the platform’s security practices
Scenario 1- The names, email address and phone numbers of over three million hotel guests.
Scenario 2- Weaknesses in the platform’s security practices.
Senerio 1:
The names, email address and phone numbers of over three million hotel guests.
Senerio 2:
Weaknesses in the platform’s security practices.
Senerio 1:
The names, email address and phone numbers of over three million hotel guests.
Scenario 1: The names, email addresses, and phone numbers of over three million hotel guests.
Scenario 2: Weaknesses in the platform’s security practices.
The card payment information of over three million guests.
Weaknesses in the platform’s security practices.
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices.
Scenario 1
The names, email addresses, and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices.
Weaknesses in the platform’s security practices.
Scenario 1.
The names, email address and phone numbers of over three million hotel guests.
Scenario 2.
Weaknesses in the platform’s security practices.
The names, email address and phone numbers of over three million hotel guests.
Scenario 1.
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices.
Scenario 1: The names, email address and phone numbers of over three million hotel guests.
Scenario 2: Weaknesses in the platform security practices.
Scenario 1 answer
The names, email address and phone numbers of over three million hotel guests.
Scenario 2 answer
Weaknesses in the platform’s security practices.
The names, email address and phone numbers of over three million hotel guests.
Weaknesses in the platform’s security practices
The names, email address and phone numbers of over three million hotel guests
Weaknesses in the platform’s security practices.
The username and password of all of the hotel’s employees.
Weaknesses in the platform’s security practices.
Scenerio 1 Answer:
The names, email address and phone numbers of over three million hotel guests.
Scenerio 2 Answer:
Weaknesses in the platform’s security practices.
Bypassing the platform’s access control methods.
Taking advantage of student information not being correctly validated on the platform
The hotel chain’s reputation.
The names, email address and phone numbers of over three million hotel guests.
SCENERIO2: Extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer
Scenario 1: The names, email address and phone numbers of over three million hotel guests.
Scenario 2: Weaknesses in the platform’s security practices.
Bypassing the platform’s access control methods.
Taking advantage of student information not being correctly validated on the platform.
Related
1. The names, email address and phone numbers of over three million hotel guests.
2. Weaknesses in the platform’s security practices.
1. Names, email addresses and phone numbers of over three million hotel guests
2.The hotel chain’s reputation.
( this includes the credibility and security reliability of the hotel)
2. Weaknesses in the platform’s security practices.
1. The names, email address and phone numbers of over three million hotel guests.
2. Weaknesses in the platform’s security practices.
Bypassing the platform’s access control methods.
The names, email address and phone numbers of over three million hotel guests
1. The names, email address and phone numbers of over three million hotel guests.
2. Weaknesses in the platform’s security practices.
1. The names, email address and phone numbers of over three million hotel guests.
2. Weaknesses in the platform’s security practices.
1.The names, email address and phone numbers of over three million hotel guests.
2.Extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer.
Scenerio I
The names, email address and phone numbers of over three million hotel guests.
Scenerio 2
Taking advantage of student information not being correctly validated on the platform.
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Taking advantage of student information not being correctly validated on the platform.
Weaknesses in the platform’s security practices.
Weaknesses in the platform’s security practices.
The names, email address and phone numbers of over three million hotel guests.
2.Weaknesses in the platform’s security practices.
Taking advantage of student information not being correctly validated on the platform
Scenero 2
1. The username and password of all of the hotel’s employees.
2.
Weaknesses in the platform’s security practices.
1. The username and password of all of the hotel’s employees.
2.
Weaknesses in the platform’s security practices.
1. The username and password of all of the hotel’s employees.
2.
Weaknesses in the platform’s security practices.
3
1. The names, email address and phone numbers of over three million hotel guests.
2. Weaknesses in the platform’s security practices.
1. The username and password of all of the hotel’s employees.
2. Weaknesses in the platform’s security practices.
1. The card payment information of over three million guests.
2. Weaknesses in the platform’s security practices.
1. The username and password of all of the hotel’s employees
2. Weaknesses in the platform’s security practices.
1. The names, email address and phone numbers of over three million hotel guests.
2. Weaknesses in the platform’s security practices.
weaknesses in the platform’s security practices
The username and password of all of the hotel’s employees
Scenario 1.The names, email address and phone numbers of over three million hotel guests.
Scenario 2. Weaknesses in the platform’s security practices.
Scenario 1: The names, email address and phone numbers of over three million hotel guests.
Scenario 2: Weaknesses in the platform’s security practices.
Weaknesses in the platform’s security practices.
Scenario 1: The names, email address and phone numbers of over three million hotel guests.
Scenario 2: Taking advantage of student information not being correctly validated on the platform.
Scenario 1: The names, email address and phone numbers of over three million hotel guests.
Scenario 2: Weaknesses in the platform’s security practices.
scenario 1: names, email address and phone numbers of over three million hotel guests.
scenario 2: weaknesses in the platform’s security practices
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices.
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices.
The names, email address and phone numbers of over three million hotel guests.
Weaknesses in the platform’s security practices.
The names, email address and phone numbers of over three million hotel guests.
Weaknesses in the platform’s security practices.
2-The names, email address and phone numbers of over three million hotel guests.
Weaknesses in the platform’s security practices.
1 The names, email address and phone numbers of over three million hotel guests.
2.Weaknesses in the platform’s security practices.
White Hat
2. Black Hat
3. Grey Hat
4. White hat
5. Black Hat
1
The username and password of all of the hotel’s employees
2
Weaknesses in the platform’s security practices.
The names, email address and phone numbers of over three million hotel guests.
Scenerio 2
Weaknesses in the platform’s security practices.
Scenario 1
1. The card payment information of over three million guests.
2. The names, email address and phone numbers of over three million hotel guests.
Scenario 2
1. Weaknesses in the platform’s security practices.
1. White Hat
2. Black hat
3.white Hat
4. Black Hat
5. Grey Hat
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices.
1. The card payment information of over three million guests.
Scenario 2.
2. Weaknesses in the platform’s security practices
1. The names, email address and phone numbers of over three million hotel guests.
2. Weaknesses in the platform’s security practices.
1. The names, email address and phone numbers of over three million hotel guests.
2. Weaknesses in the platform’s security practices.
The names, email address and phone numbers of over three million hotel guests .
Weaknesses in the platform’s security practices.
The card payment information of over three million guests.
Scenerio1
The names, email address and phone numbers of over three million hotel guests.
Scenerio2
Weaknesses in the platform’s security practices.
The names, email address and phone numbers of over three million hotel guests.
Weaknesses in the platform’s security practices.
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices.
scenario 2
Weaknesses in the platform’s security practices.
Extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer.
Bypassing the platform’s access control methods.
Taking advantage of student information not being correctly validated on the platform.
The names, email address and phone numbers of over three million hotel guests.
The hotel chain’s reputation.
Scenario 1
The username and password of all of the hotel’s employees.
Scenario 2
Weaknesses in the platform’s security practices.
Weaknesses in the platform’s security practices.
The hotel chain’s reputation.
1. White Hat
2. Black Hat
3. White Hat
4. Black hat
5. Gray Hat
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices.
The card payment information of over three million guests.
Weaknesses in the platform’s security practices.
scenario 1
The names, email address and phone numbers of over three million hotel guests.
scenario 2
Weaknesses in the platform’s security practices.
Weaknesses in the platform’s security practices.
The names, email address and phone numbers of over three million hotel guests.
Scenario 1
The hotel chain’s reputation.
Scenario 2
Weaknesses in the platform’s security practices.
Scenerio 1
The names, email address and phone numbers of over three million hotel guests.
Scenerio 2
Weaknesses in the platform’s security practices.
The card payment information of over three million guests.
Weaknesses in the platform’s security practices.
The names, email address and phone numbers of over three million hotel guests.
Weaknesses in the platform’s security practices.
Scenario 1
The hotel chain’s reputation.
Scenario 2
Weaknesses in the platform’s security practices.
The names, email address and phone numbers of over three million hotel guests.
Weaknesses in the platform’s security practices.
Weaknesses in the platform’s security practices
The names, email address and phone numbers of over three million hotel guests
Scenario 1
-The hotel chain’s reputation.
Scenario 2
-Weaknesses in the platform’s security practices.
Scenario 2
Weaknesses in the platform’s security practices.
Scenario 1
The hotel chain’s reputation.
Scenario 2
Weaknesses in the platform’s security practices.
Scenario 2
Weaknesses in the platform’s security practices.
The names, email address and phone numbers of over three million hotel guests
1 Gray hat
2 Black hat
3 White hat
4 Black Hat
5 White Hat
The names, email address and phone numbers of over three million hotel guests.
scenario 2
Weaknesses in the platform’s security practices.
1. White hat
2. Black hat
3. White hat
4. Black hat
5. Grey hat
Scenario 1:
-The card payment information of over three million guests.
-The hotel chain’s reputation.
Scenario 2:
-Weaknesses in the platform’s security practices.
Scenario 1
The hotel chain’s reputation
Scenario 2
Bypassing the platform’s access control methods.
1 WHITE HAT
2 BLACK HAT
3 WHITE HAT
4 BLACK HAT
5 GRAY HAT
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weakness in the platform’s security practices
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weakness in the platform’s security practices
Weaknesses in the platform’s security practices.
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
The username and password of all of the hotel’s employees.
Scenario 2
Weaknesses in the platform’s security practices.
Scenario 1
The names, email address and phone numbers of over three million hotel guests
Scenario 2.
Weaknesses in the platform’s security practices.
1. White
2. Black
3. Gray
4. Black
5. Gray
Scenario 1
The username and password of all the hotel’s employees
Scenario 2
Weakness in the platform’s security
Scenario 1:- The card payment information of over three million guests.
Scenario 2:- Weaknesses in the platform’s security practices.
for the first senerio they took the hotel chain’s reputation. then for the second senerio the exploited the Weaknesses in the platform’s security practices
Weaknesses in the platform’s security practices.
The username and password of all of the hotel’s employees.
SCENARIO 1
The username and password of all of the hotel’s employees.
SCENARIO 2
Bypassing the platform’s access control methods.
The names, email address and phone numbers of over three million hotel guests
SCENARIO 2
Weaknesses in the platform’s security practices.
SCENARIO 1
The names, email address and phone numbers of over three million hotel guests
SCENARIO 2
Weaknesses in the platform’s security practices.
Weaknesses in the platform’s security practices.
1. Gray hat
2. Black hat
3. White hat
4. Black hat
5. White hat
SCENARIO 1
The names, email address and phone numbers of over three million hotel guests.
SCENARIO 2
Weaknesses in the platform’s security practices.
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weakness in the platform’s security practices
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weakness in the platform’s security practices
1;White hat
2-Black hat
3-White hat
4-Black hat
5-White hat
1-The names, email address and phone numbers of over three million hotel guests.
2-Weaknesses in the platform’s security practices.
1. Gray
2. Black
3. White
4. Black
5. White
Scenario 1
The username and password of all of the hotel’s employees.
Scenario 2
Bypassing the platform’s access control methods.
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices.
1. Gray hat
2. Black hat
3. White hat
4. Gray hat
5. White hat
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices.
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices.
The names, email address and phone numbers of over three million hotel
Weaknesses in the platform’s security practices.
Weaknesses in the platform’s security practices.
1. Gray hat
2. Black hat
3. White hat
4. Gray hat
5. White hat
Weaknesses in the platform’s security practices.
Extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer.
Gray hat
Black hat
White hat
Black hat
White hat
Weaknesses in the platform’s security practices
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices.
Day 2
1. Gray hat
2. Black hat
3. White hat
4. Black hat
5. White hat
Class completed for the day
My Answers
1. Gray hat
2. Black hat
3. White hat
4. Black hat
5. White hat
Class completed for the day
The names, email address and phone numbers of over three million hotel guests
1. The names, email address and phone numbers of over three million hotel guests.
2. Weaknesses in the platform’s security practices.
Weaknesses in the platform’s security practices.
1.white hat
2.Gray hat
3.white hat
4. Black hat
5.white hat
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices.
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices.
Weaknesses in the platform’s security practices.
The names, email address and phone numbers of over three million hotel guests.
Day 2
1. White hat
2. Gray hat
3. White hat
4. Black hat
5. White hat
1. Gray hat
2. Black hat
3. White hat
4. Black hat
5. White hat
Day 2
1. Gray hat
2. Black hat
3. White hat
4. Black hat
5. White hat
answer 1: white hat
answer 2: black hat
answer 3: white hat
answer4: gray hat
answer 5: gray hat
1. White hat
2. Black hat
3. White hat
4. Black hat
5. Grey hat
1. Grey hat
2. Black hat
3. White hat
4. Black hat
5. White hat
Scenario 1
The hotel chain’s reputation
Weaknesses in the platform’s security practices
Cyber Attackers Scenarios Answers
1. Gray white
2. Black hat
3. White Hat
4.Black hat
5.White hat
Scenario 2
Weaknesses in the platform’s security practices.
The names, email address and phone numbers of over three million hotel guests.
The hotel chain’s reputation.
1. Gray white
2. Black hat
3. White Hat
4.Black hat
5.White hat
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices.
Senerio 1- The username and password of all of the hotel’s employees.
Senerio 2- Weaknesses in the platform’s security practices.
Extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer.
1. Gray hat
2. Black hat
3. White hat
4. Black hat
5. White hat
Weaknesses in the platform’s security practices.
The names, email address and phone numbers of over three million hotel guests
The names, email address and phone numbers of over three million hotel guests.
Weaknesses in the platform’s security practices.
1.Gray hat attackers
2. Black hat attackers
3. White hat attackers
4. Black hat ATTACKERS
5. White hat attackers
1. White hat
2. Black hat
3. White hat
4. Black hat
5. Gray hat
White hat
Black hat
White hat
Black hat
Gray hat
1. Gray hat
2. Black hat
3. White hat
4. Black hat
5. White hat
Scenario 1 – The card payment information of over three million guests
Scenario 2- Weaknesses in the platform’s security practices.
Scenario 1 – The username and password of all of the hotel’s employees.
Scenario 2 – Weaknesses in the platform’s security practices.
SCENARIO 1 The names, email address and phone numbers of over three million hotel guests.
SCENARIO 2 Weaknesses in the platform’s security practices.
Answers:
1. White hat
2. Black hat
3. White hat
4. Black hat
5. Gray hat
Gray hat
Black hat
White hat
Gray hat
White hat
The username and password of all of the hotel’s employees.
Weaknesses in the platform’s security practices.
The card payment information of over three million guests.
Scenario 2
Bypassing the platform’s access control methods
scenario 2: Weaknesses in the platform’s security practices.
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2.
Taking advantage of student information not being correctly validated on the platform.
scenario 1: The names, email address and phone numbers of over three million hotel guests.
Day 2
White hat
Black hat
White hat
Black hat
Gray hat
White hat
Black hat
White hat
Black hat
Gray hat
Scenario 1:The names, email address and phone numbers of over three million hotel guests.
Scenario 2: Weaknesses in the platform’s security practices.
Scenerio 1: The names, email address and phone numbers of over three million hotel guests.
Scenerio 2: Weaknesses in the platform’s security practices.
Scenerio 1: The names, email address and phone numbers of over three million hotel guests.
Scenerio 2: Weaknesses in the platform’s security practices.
Day 2✅
1. Gray hat
2. Black hat
3. White hat
4. Black hat
5. White hat
Scenerio 1: The names, email address and phone numbers of over three million hotel guests.
Scenerio 2: Weaknesses in the platform’s security practices.
2.The names, email address and phone numbers of over three million hotel guests.
Question 1 answer – The names, email address and phone numbers of over three million hotel guests.
Question 2 answer – Weaknesses in the platform’s security practices.
Question 1 answer – The names, email address and phone numbers of over three million hotel guests.
Question 2 answer- Weaknesses in the platform’s security practices.
Bypassing the platform’s access control methods.
1. Gray hat
2. Black hat
3. White hat
4. Black hat
5. White hat
Scenario I
The names, email address and phone numbers of over three million hotel guests.
Senerio 1: B. The names, email address and phone numbers of over three million hotel guests
Senerio 2: Weaknesses in the platform’s security practices.
Taking advantage of student information not being correctly validated on the platform.
Scenario 2
Weaknesses in the platform’s security practices.
Cyber Attackers Questions
1. White Hat
2. Black Hat
3. White Hat
4. Black Hat
5. Grey Hat
Weaknesses in the platform’s security practices.
The names, email address and phone numbers of over three million hotel guests.
Cyber Attacker Question
Answers.
1. White Hat
2.Black Hat.
3.White Hat
4.Black Hat
5.Gray Hat
1. Gray
2. Black
3. White
4. Gray
5. White
The names, email address and phone numbers of over three million hotel guests
1- Gray hat
2- Black hat
3- White hat
4- Black hat
5- Gray hat
Scenario 1
The card payment information of over three million guests.
Scenario 2
Weaknesses in the platform’s security practices.
The card payment information of over three million guests
The card payment information of over three million guests.
2. Weaknesses in the platform’s security practices.
1- Gray hat
2- Black hat
3- White hat
4- Black hat
5- Gray hat
Day 2
1 Gray hat
2 Black hat
3 White hat
4 Black hat
5 Gray hat
1.The names, email address and phone numbers of over three million hotel guests.
Scenario 1
The card payment information of over three million guests.
Scenario 2
Weaknesses in the platform’s security practices.
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices.
Scenario 1:
The names, email address and phone numbers of over three million hotel guests
Scenario 2:
Weaknesses in the platform’s security practices.
Scenario 1
The names, email address and phone numbers of over three million hotel guests
Scenario 2
Weaknesses in the platform’s security practices.
Day 2
1. Gray hat
2. Black hat
3. White hat
4. Black hat
5. White hat
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices.
Scenario 1:
1. The names, email addresses, and phone numbers of over three million hotel guests.
2. Hotel chain reputation
Scenario 2
1. Weaknesses in the platform’s security practices
1.White hat
2.Black hat
3.White hat
4.Gray hat
5.White hat
Scenario 2
Weaknesses in the platform’s security practices.
Scenerio 1 :
The card payment information of over three million guests.
The names, email address and phone numbers of over three million hotel guests.
The hotel chain’s reputation.
Scenerio 2 :
Weaknesses in the platform’s security practices.
Scenario 1.
The card payment information of over three million guests.
Scenario 2.
Weaknesses in the platform’s security practices.
Scenario 1:
3. The hotel chain’s reputation.
Scenario 2:
1. Weaknesses in the platform’s security practices.
Gray hat
Black hat
White hat
Black hat
White hat
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices.
1. The hotel chain’s reputation
2. Weaknesses in the platform’s security practices
The card payment information of over three million guests.
Extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer.
Secenerio 1:
3. The hotel chain’s reputation.
Secenerio 2:
1. Weaknesses in the platform’s security practices.
Weaknesses in the platform’s security practices.
Weaknesses in the platform’s security practices
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices.
Weaknesses in the platform’s security practices.
The names, email address and phone numbers of over three million hotel guests.
Weaknesses in the platform’s security practices
The names, email address and phone numbers of over three million hotel guests.
Weaknesses in the platform’s security practices.
The username and password of all of the hotel’s employees.
Weaknesses in the platform’s security practices.
1. The names, email address and phone numbers of over three million hotel guests.
2. Weaknesses in the platform’s security practices.
Hi, Am at the first stage of Cyber Security Beginners course quiz, but I cant find the questions to the answer written, I need help with where to find the question to the answers pls.
1) White hat
2) Black hat
3)White hat
4)Gray hat
5)White hat
Scenario 2
Weaknesses in the platform’s security practices.
The names, email address and phone numbers of over three million hotel guests
1. The names, email address and phone numbers of over three million hotel guests.
2 Weaknesses in the platform’s security practices.
Weaknesses in the platform’s security practices.
Scenario 1
Ans: The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Ans: Weaknesses in the platform’s security practices.
Scenario 1: The names, email address and phone numbers of over three million hotel guests.
Scenerio 2: Weaknesses in the platform’s security practices.
The names, email address and phone numbers of over three million hotel guests.
Scenario 1: The names, email address and phone numbers of over three million hotel guests.
Scenario 2: Weaknesses in the platform’s security practices.
1. The names, email address and phone numbers of over three million hotel guests.
2. Weaknesses in the platform’s security practices.
Scenario 1.Names, email address and phone numbers of over three million hotel guests.
Scenario 2. Weaknesses in the platform’s security practices.
Scenario 1: The names, email address and phone numbers of over three million hotel guests.
Scenario 1: Taking advantage of student information not being correctly validated on the platform.
Scenario 1. names, email address and phone numbers of over three million hotel guests
Scenario 2.Weaknesses in the platform’s security practices.
Scenario 1: The names, email address and phone numbers of over three million hotel guests.
Scenario 2: Weaknesses in the platform’s security practices.
Scenario 1: The names, email address and phone numbers of over three million hotel guests.
Scenario 2: Weaknesses in the platform’s security practices.
Scenario 1: The names, email addresses, and phone numbers of over three million hotel guests.
Scenario 2: Student information left exposed
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Bypassing the platform’s access control methods.
Scenario 1: The names, email address and phone numbers of over three million hotel guests.
Scenario 2: Bypassing the platform’s access control methods.
The names, email address and phone numbers of over three million hotel guests
The hotel chain’s reputation.
Bypassing the platform’s access control methods
Weaknesses in the platform’s security practices
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices.
1. The names, email address and phone numbers of over three million hotel guests.
2. Weaknesses in the platform’s security practices.
Taking advantage of student information not being correctly validated on the platform
The hotel chain’s reputation
The card payment information of over three million guests.
2
1.The names, email address and phone numbers of over three million hotel guests.
2.Weaknesses in the platform’s security practi
1.The names, email address and phone numbers of over three million hotel guests.
2.Weaknesses in the platform’s security practices
Scenario 1
The card payment information of over three million guests.
Scenario 2
Weaknesses in the platform’s security practices.
Senerio 1: The names, email address and phone numbers of over three million hotel guests.
Senerio 2: Weaknesses in the platform’s security practices.
Weaknesses in the platform’s security practices.
The hotel chain’s reputation.
Bypassing the platform’s access control methods.
Scenario 1
Answer: The hotel chain’s reputation.
Scenario 2
Answer: Weaknesses in the platform’s security practices.
Scenario 1:
The names, email address and phone numbers of over three million hotel guests
Scenario 2:
Weaknesses in the platform’s security practices
Scenario 1
The hotel chain’s reputation.
Scenario 2
Weaknesses in the platform’s security practices.
The card payment information of over three million guests.
The names, email address and phone numbers of over three million hotel guests
The names, email address and phone numbers of over three million hotel guests.
The hotel chain’s reputation.
Weaknesses in the platform’s security practices.
Scenario 1:
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practice.
Scenario 1:
The names, email address and phone numbers of over three million hotel guests.
Scenario 2: Weaknesses in the platform’s security practices.
The card payment information of over three million guests.
Weaknesses in the platform’s security practices.
Scenario 2:
Weaknesses in the platform’s security practices.
Scenario 1:
The names, email address and phone numbers of over three million hotel guests.
Senario 1:
The names, email address and phone numbers of over three million hotel guests.
Se
Scenario 1: The hotel chain’s reputation.
Scenario 2: Weaknesses in the platform’s security practices.
Scenario 1:
The card payment information of over three million guests.
The names, email address and phone numbers of over three million hotel guests.
The username and password of all of the hotel’s employees.
Scenario 2:
Weaknesses in the platform’s security practices.
The username and password of all of the hotel’s employees.
Weaknesses in the platform’s security practices.
1. The names, email address and phone numbers of over three million hotel guests.
2. Weaknesses in the platform’s security practices.
The names, email address and phone numbers of over three million hotel guests.
Bypassing the platform’s access control methods.
Weaknesses in the platform’s security practices
Weaknesses in the platform’s security practices.
Senario 1: The names, email address and phone numbers of over three million hotel guests.
Senario 2: Taking advantage of student information not being correctly validated on the platform.
scenario 1. The hotel chain’s reputation.
Scenario 2. Weaknesses in the platform’s security practices.
Weaknesses in the platform’s security practices.
1. The names, email address and phone numbers of over three million hotel guests.
2. Weaknesses in the platform’s security practices.
The names, email address and phone numbers of over three million hotel guests.
Weaknesses in the platform’s security practices.
scenario 1
The card payment information of over three million guests.
The names, email address and phone numbers of over three million hotel guests.
The hotel chain’s reputation.
scenario 2
Bypassing the platform’s access control methods.
The hotel chain’s reputation.
Senario 1
The names, email address and phone numbers of over three million hotel guests.
Senario 2
Weaknesses in the platform’s security practices.
Scenerio 1.
The hotel chain’s reputation.
Scenerio 2,
Weaknesses in the platform’s security practices.
Scenario 1 Weaknesses in the platform’s security practices
Scenario 2 The hotel chain’s reputation.
The hotel chain’s reputation.
Weaknesses in the platform’s security practices
The names, email address and phone numbers of over three million hotel guests
Scenerio 1.
The hotel chain’s reputation.
Scenerio 2,
Weaknesses in the platform’s security practices.
Scenerio 1.
The hotel chain’s reputation.
Scenerio 2,
Weaknesses in the platform’s security practices.
Weaknesses in the platform’s security practices.
Scenario I
What was taken?
The hotel chain’s reputation
Scenario 2
What exploits?
Weaknesses in the platform’s security practices.
Senario 1
The names, email address and phone numbers of over three million hotel guests.
Senario 2
Weaknesses in the platform’s security practices.
Senario 1
The names, email address and phone numbers of over three million hotel guests.
Senario 2
Weaknesses in the platform’s security practices.
*The names, email address and phone numbers of over three million hotel guests.
*Weaknesses in the platform’s security practices.
Senario 1
The card payment information of over three million guests
Senario 2
Weaknesses in the platform’s security practices.
Scenario 1
Hotels chain reputation
Scenario 2
Weaknesses in the platform’s security practices.
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer.
Scenario 2
Weaknesses in the platform’s security practices.
Scenario 1
The hotel chain’s reputation.
Scenario 2
Weaknesses in the platform’s security practices.
Scenario 1: The names, email address and phone numbers of over three million hotel guests.
Scenario 2: Weaknesses in the platform’s security practices.
Scenario 1
The hotel chain’s reputation.
Scenario 2
Weaknesses in the platform’s security practices.
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices.
Senecio 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices.
The names, email address and phone numbers of over three million hotel guests.
Scenario 1: The names, email address and phone numbers of over three million hotel guests
Scenario 2: Weaknesses in the platform’s security practices.
Scenario 2:
Weaknesses in the platform’s security practices.
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices.
Scenario 1:
The card payment information of over three million guests.
Scenario 1. The names, email addresses and phone numbers of over three million hotel guests.
The card payment information of over three million guests.
Scenario 2. Weaknesses in the platform’s security practices.
Scenario 1: The names, email address and phone numbers of over three million hotel guests.
Scenario 2: Taking advantage of student information not being correctly validated on the platform.
Scenario 1:
The card payment information of over three million guests.
The names, email address and phone numbers of over three million hotel guests.
Scenario 2: Weaknesses in the platform’s security practices.
Weakness in the platforms security practices
Scenario 2: Weaknesses in the platform’s security practices
The names, email address and phone numbers of over three million hotel guests.
Weaknesses in the platform’s security practices.
scenario 1:The card payment information of over three million guests
scenario 2:
Weaknesses in the platform’s security practices
Scenario1:
The hotel chain’s reputation
Scenario 2:
Weaknesses in the platform’s security practices.
The names, email address and phone numbers of over three million hotel guests.
Weaknesses in the platform’s security practices.
Case scenario 2.
Weaknesses in the platform’s security practices.
1)The names, email address and phone numbers of over three million hotel guests.
2)Weaknesses in the platform’s security practices.
Weaknesses in the platform’s security practices.
Scenario 1:
The names, email address and phone numbers of over three million hotel guests.
Scenario 2:
Weaknesses in the platform’s security practices.
Case scenario 1.
The names, email address and phone numbers of over three million hotel guests.
Weaknesses in the platform’s security practices.
Scenario 1:
The names, email address and phone numbers of over three million hotel guests.
Scenario 2:
Weaknesses in the platform’s security practices.
The names, email address and phone numbers of over three million hotel guests.
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices.
Scenario 1:
The names, email address and phone numbers of over three million hotel guests.
Scenario 2:
Weaknesses in the platform’s security practices.
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices
1: White hat
2:Black hat
3:White hat
4:Black hat
5:Grey hat
The hotel chain’s reputation.
Scenario 1
Answer – The hotel chain’s reputation
Scenario 2
Answer – Weaknesses in the platform’s security practices.
Scenario 1:
The card payment information of over three million guests.
The names, email address and phone numbers of over three million hotel guests.
The hotel chain’s reputation.
Scenario 2:
Weaknesses in the platform’s security practices.
1)The names, email address and phone numbers of over three million hotel guest
2)Weaknesses in the platform’s security practices.
1. The hotel chain reputation
2.Weakness of the platform’s security practices
SCENARIO 1
The username and password of all of the hotel’s employees.
SCENARIO 2
Weaknesses in the platform’s security practices.
1) The names, email address and phone numbers of over three million hotel guests.
2)Weaknesses in the platform’s security practices.
1) The names, email address and phone numbers of over three million hotel guests.
2)Weaknesses in the platform’s security practices.
Scenerio 1:The names, email address and phone numbers of over three million hotel guests.
Scenerio2: Weaknesses in the platform’s security practices.
1.The names, email address and phone numbers of over three million hotel guests.
2.Weaknesses in the platform’s security practices.
Scenario 2
Weaknesses in the platform’s security practices.
The names, email address and phone numbers of over three million hotel guests.
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices.
scenario 1: The names, email address and phone numbers of over three million hotel guests.
scenario 2: Weaknesses in the platform’s security practices.
Scenario 1
The names, email addresses, and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices.
Scenario 1. The names, email address and phone numbers of over three million hotel guests.
Scenario 2. Weaknesses in the platform’s security practices.
The card payment information of over three million guests
Scenario 1
The hotel chain’s reputation.
Scenario 2
Weaknesses in the platform’s security practices.
Scenerio 1:
The hotel chain’s reputation.
The names, email address and phone numbers of over three million hotel guests.
Scenerio 2:
Weaknesses in the platform’s security practices.
Bypassing the platform’s access control methods.
Scenario 1: The names, email address and phone numbers of over three million hotel guests.
Scenario 2:
Weaknesses in the platform’s security practices.
Scenario 1- The username and password of all of the hotel’s employees.
Scenario 2 – Extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer.
Scenario 1:-The names, email address and phone numbers of over three million hotel guests
Scenario 2:- Weaknesses in the platform’s security practices.
1. White hat attacker
2. Black hat attacker
3. Gray hat attacker
4. Black hat attacker
5. White hat attacker
Scenario 2
The names, email address and phone numbers of over three million hotel guests.
Bypassing the platform’s access control methods.
1. The hotel chain’s reputation.
2. Weaknesses in the platform’s security practices.
Kingsley Okolie
Cohort 2, Cyber security for beginners
Team 3
Scenario 1- The names, email address and phone numbers of over three million hotel guests.
Scenario 2 – Weaknesses in the platform’s security practices.
1. The hotel chain’s reputation.
2. Weaknesses in the platform’s security practices.
Weaknesses in the platform’s security practices.
Weaknesses in the platform’s security practices.
The hotel chain’s reputation.
Scenario 2
Weaknesses in the platform’s security practices.
The card payment information of over three million guests.
Scenario 1
The names, email addresses and phone numbers of over three million hotel guests
Scenario 2
Weaknesses in the platform’s security practices.
The names, email address and phone numbers of over three million hotel guests.
Scenario 1
The names, email addresses and phone numbers of over three million hotel guests
Scenario 2
Weaknesses in the platform’s security practices.
The username and password of all of the hotel’s employees.
1) The names, email address and phone numbers of over three million hotel guests.
2) Weaknesses in the platform’s security practices.
Weaknesses in the platform’s security practices
Scenario 2: Taking advantage of student information not being correctly validated on the platform.
Scenario 1: The names, email address and phone numbers of over three million hotel guests.
Section 1 – The names, email address and phone numbers of over three million hotel guests.
The hotel chain’s reputation.
Section 2 – Weaknesses in the platform’s security practices.
Bypassing the platform’s access control methods.
Weaknesses in the platform’s security practices.
The names, email address and phone numbers of over three million hotel guests.
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices.
Sceneraio 1
The names, email address and phone numbers of over three million hotel guests.
Sceneraio 2
Weaknesses in the platform’s security practices.
Scenario 1
The hotel chain’s reputation.
Scenario 2
Weaknesses in the platform’s security practices.
1. The names, email address and phone numbers of over three million hotel guests
2. Weaknesses in the platform’s security practices.
SCENARIO 2
The weakness in the platforms security practices was exploited.
SCENARIO 1
The names, email addresses and phone numbers of 3 Million guests were taken.
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices.
Scenario 2
Weaknesses in the platform’s security practices.
Scenario 1
The hotel chain’s reputation
scenario 2
Weaknesses in the platform’s security practices
Scenario 1
The hotel chain’s reputation
Scenario 2
Weaknesses in the platform’s security practices.
scenario 1: The names, email address and phone numbers of over three million hotel guests
senario 2:weakness in the platform security practices
Scenario 1: The names, email address and phone numbers of over three million hotel guests.
Scenario 2: Weaknesses in the platform’s security practices
Scenario 1 – The hotel chain’s reputation.
Scenario 2 – Weaknesses in the platform’s security practices.
Scenerio 1- The hotel chain’s reputation.
Scenerio 2- Weaknesses in the platform’s security practices.
1. The names, email address and phone numbers of over three million hotel guests.
2. Bypassing the platform’s access control methods.
Scenario 1: The names, email addresses, and phone numbers of over three million hotel guests.
Scenario 2: Weaknesses in the platform’s security practices.
Scenario 1;
The names, email addresses and phone numbers of over three million hotel guests.
Scenario 2;
Weaknesses in the platform’s security practices.
Weaknesses in the platform’s security practices.
Bypassing the platform’s access control methods.
1)The names, email address and phone numbers of over three million hotel guests.
2) weakness in the platform’s security practices
The card payment information of over three million guests.
The hotel chain’s reputation.
The username and password of all of the hotel’s employees.
Scenerio 1:
The hotel chain’s reputation.
Scenerio 2:
Weaknesses in the platform’s security practices.
Scenario 1: The names, email address and phone numbers of over three million hotel guests.
Scenario 2: Weaknesses in the platform’s security practices.
Weaknesses in the platform’s security practices.
The names, email address and phone numbers of over three million hotel guests.
1st Scenario :The names,email address and phone numbers of over three million hotel guest
2nd Scenario :Weakness in the platform’s security practices
1st Scenario: The names, email address and phone numbers of over three million hotel guests.
2nd Scenario: Weaknesses in the platform’s security practices.
1st scenerio: The names, email address and phone numbers of over three million hotel guests.
2nd scenerio: Weaknesses in the platform’s security practices.
scenario 2 Ans: Weaknesses in the platform’s security practices.
Scenerio 2 Ans.
Bypassing the platform’s access control methods.
The card payment information of over three million guests.
The username and password of all of the hotel’s employees.
Scenario 1:
Ans:
The names, email address and phone numbers of over three million hotel guests.
Scenario 2:
Ans:
Weaknesses in the platform’s security practices.
What color is my hat?
1) Grey hat
2) Black hat
3) White hat
4) Black hat
5) White hat
1) The names, email address and phone numbers of over three million hotel guests.
The hotel chain’s reputation.
2) Weaknesses in the platform’s security practices
1) The card payment information of over three million guest
2) Weakness in the platforms security practices
What color is my hat?
1) Grey hat
2) Black hat
3) White hat
4) Black hat
5) White hat
Scenario 1: The names, email address and phone numbers of over three million hotel guests.
Scenario 2: Weaknesses in the platform’s security practices.
first scenario
The username and password of all of the hotel’s employees
second scenario
Weaknesses in the platform’s security practices.
Scenario 1
The card payment information of over three million guests.
Scenario 2
Weaknesses in the platform’s security practices.
1. Black hat
2. Black hat
3. White hat
4. Black hat
5. White hat
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices.
Weaknesses in the platform’s security practices.
Weaknesses in the platform’s security practices
The names, email address and phone numbers of over three million hotel guests
The names, email address and phone numbers of over three million hotel guest
Scenario one;
Answer: the names, email addresses and phone numbers of over three million hotel guests.
Scenario two:
Answer: weakness in the platform’s security practices
weakness in the platforms security practice
The names, email address and phone numbers of over three million hotel guests.
Weaknesses in the platform’s security practices.
The names, email address and phone numbers of over three million hotel guests
Weaknesses in the platform’s security practices.
While it’s unclear what the hackers have done with this acquired information, it’s safe to say that they have everything they need to carry out widespread phishing or malware attacks.
The names, email address and phone numbers of over three million hotel guests.
1.The names, email address and phone numbers of over three million hotel guests.
2.Weaknesses in the platform’s security practices.
Weaknesses in the platform’s security practices
The names, email address and phone numbers of over three million hotel guests,
1. The names, email address and phone numbers of over three million hotel guests,
2. Weaknesses in the platform’s security practices.
Scenario 1
White hat
Scenario 2
Black hat
Scenario 3
White hat
Scenario 4
black hat
Scenario 5
White hat
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices
The names, email address and phone numbers of over three million hotel guests.
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices.
Scenario 1
The names, email address and phone
numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices.
The names, email address and phone numbers of over three million hotel guests.
Scenerio 1
The names, email address and phone numbers of over three million hotel guests.
Scenerio 2
Weaknesses in the platform’s security practices.
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
The hotel chain’s reputation.
Scenario 2
Weaknesses in the platform’s security practices.
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
The hotel chain’s reputation.
Scenario 2
Weaknesses in the platform’s security practices.
Scenario 1.
Ans. The names, email address and phone numbers of over three million hotel guests
Scenario 2
Ans. Weaknesses in the platform’s security practices.
1. The names, email address and phone numbers of over three million hotel guests
2. Weaknesses in the platform’s security practices
1 The names,email address and phone numbers of over 3 million hotel guest.
2 weaknesses in the platform’s security practices.
Weaknesses in the platform’s security practices.
The names, email address and phone numbers of over three million hotel guests.
weaknesses in the platform’s security practices
Scenario 1
The names, email address and phone numbers of over three million hotel guests
Scenario 2
Weaknesses in the platform’s security practices
1.The names, email address and phone numbers of over three million hotel guests.
2.Weaknesses in the platform’s security practices.
1. The names, email addresses and phone numbers of over 3 million hotel guests
2. weaknesses in the platform’s security practices
1. Weaknesses in the platform’s security practices.
2. The names, email address and phone numbers of over three million hotel guests.
1. WHITE HAT
2. BLACK HAT
3. WHITE HAT
4. BLACK HAT
5. GRAY HAT
The names, email address and phone numbers of over three million hotel guests.
Scenario 1.
The username and password of all of the hotel’s employees.
Scenario 2.
Weaknesses in the platform’s security practices.
1. White hat
2. Black hat
3. White hat
4. Gray hat
5. White hat
Scenario 1.
The username and password of all of the hotel’s employees.
Scenario 2.
Weaknesses in the platform’s security practices.
Scenario one;
Answer: the names, email addresses and phone numbers of over three million hotel guests.
Scenario two:
Answer: weakness in the platform’s security practices.
1. The names, email address and phone numbers of over three million hotel guests.
2.Weaknesses in the platform’s security practices.
scenario 1
1.the names, email address and phone numbers of over three million hotel guests.
2. Weaknesses in the platform’s security practices.
Scenaria 1: The names, email addresses, and phone numbers of over three million hotel guests.
Scenario 2: Weaknesses in the platform’s security practices.
Scenario 1: The names, email address and phone numbers of over three million hotel guests.
Scenario 2: Weaknesses in the platform’s security practices.
1. The names, email address and phone numbers of over three million hotel guests.
2. Weaknesses in the platform’s security practices.
Scenario 1
– The names, email address and phone numbers of over three million hotel guests.
– The hotel chain reputation
Scenario 2
Weaknesses in the platform’s security practices.
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices.
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices.
Scenario 1:
The names, email address and phone numbers of over three million hotel guests.
Scenario 2:
Weaknesses in the platform’s security practices.
Scenario 1
The hotel chain’s reputation
Scenario 2
Weaknesses in the platform’s security practices.
Scenario 1
The Hotel’s reputation
Scenario 2
The weaknesses in the platform’s security practices.
Scenario 1
The hotel chain’s reputation.
Scenario 2
Weaknesses in the platform’s security practices.
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices.
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices.
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices
Scenerio 1
The hotel chain’s reputation.
Scenerio 2
Weaknesses in the platform’s security practices.
SCANARIO 1
The hotel chain’s reputation.
SCANERIO 2
Bypassing the platform’s access control methods
Scenario 1
* The names, email address and phone numbers of over three million hotel guests.
Scenario 2
* Weaknesses in the platform’s security practices.
Scenario 1 The card payment information of over three million guests.
Scenario 2 Weaknesses in the platform’s security practices.
Scenario 1 The card payment information of over three million guests.
Scenario 2 Weaknesses in the platform’s security practices.
1. The names, email address and phone numbers of over three million hotel guests
2.Weaknesses in the platform’s security practices.
Scenario 1: The names, email address and phone numbers of over three million hotel guests
Scenario 2: Weaknesses in the platform’s security practices.
Scenario 1 : The Names, Email address, and Phone Numbers of over three million hotel guests.
Scenario 2 : Weakness in the platform security practices.
Scenario 1 : The Names, Email address, and Phone Numbers of over three million hotel guests.
Scenario 1 The hotel chains reputation
Scenario 2 Weaknesses in the platform’s security practices.
SCENARIO 1
The names, email addresses, and phone numbers of over three million hotel guests.
SCENARIO 2
Weaknesses in the platform’s security practices.
FIRST SCENARIO
: The names, email addresses, and phone numbers of over three million hotel guests.
SECOND SCENARIO
: Weaknesses in the platform’s security practices.
Scenario 1
* The names, email address and phone numbers of over three million hotel guests.
Scenario 2
* Weaknesses in the platform’s security practices.
The names, email address and phone numbers of over three million hotel guests.
Scenario 1
*The names, email address and phone numbers of over three million hotel guests.
*The hotel chain’s reputation.
scenario 2
*Weaknesses in the platform’s security practices.
The names, email address and phone numbers of over three million hotel guests.
Weaknesses in the platform’s security practices.
Scenario 1
*The names, email address and phone numbers of over three million hotel guests.
*The hotel chain’s reputation.
scenario 2
*Weaknesses in the platform’s security practices.
The names, email address and phone numbers of over three million hotel guests.
Extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer.
scenario 1
*The names, email address and phone numbers of over three million hotel guests.
*The hotel chain’s reputation.
scenario 2
*Weaknesses in the platform’s security practices.
the use of Chat GPT to create questions for engagement surveys, analyze and also the implementations of AI assistant could even support more ‘proactive’ aspects of HR and allow HR teams to make a real difference to the culture of an organization. But i believe that this will make HRM work more artificial and also reduce manpower
The card payment information of over three million guests.
Taking advantage of student information not being correctly validated on the platform.
Scenerio 1: The names, email address and phone numbers of over three million hotel guests.
Scenerio 2: Weaknesses in the platform’s security practices.
Scenerio 1: The card payment information of over three million guests.
Scenerio 2: Weaknesses in the platform’s security practices.
1. WHITE HAT
2. BLACK HAT
3. WHITE HAT
4. BLACK HAT
5. GRAY HAT
SCENARIO 1:
The card payment information of over three million guests.
The names, email address and phone numbers of over three million hotel guests.
The hotel chain’s reputation.
SCENARIO 2:
Weaknesses in the platform’s security practices.
Extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer.
Bypassing the platform’s access control methods.
SCENARIO 1: The names, email address and phone numbers of over three million hotel guests.
SCENARIO 2: Weaknesses in the platform’s security practices.
SCENARIO 1: The names, email address and phone numbers of over three million hotel guests.
SCENARIO 2: Weaknesses in the platform’s security practices.
SCENARIO 1: The names, email address and phone numbers of over three million hotel guests.
SCENARIO 2: Weaknesses in the platform’s security practices.
Scenario 1
The hotel’s chain reputation
Scenario 2
Weaknesses in the platform’s security practices
1. “Mmm… I’m not sure we’re allowed to use the private Wi-Fi network. Let me check with my manager first.”
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
The hotel chain’s reputation.
Scenario 2
Weaknesses in the platform’s security practices.
Taking advantage of student information not being correctly validated on the platform.
Scenario 2 : Weaknesses in the platform’s security practices
scenario 1 : The names, email address and phone numbers of over three million hotel guests.
The username and password of all of the hotel’s employees.
Weaknesses in the platform’s security practices
Scenario 1:
The names, email address and phone numbers of over three million hotel guests.
Scenario 2:
Weaknesses in the platform’s security practices.
White hat
Black hat
White hat
Gray hat
White hat
Weaknesses in the platform’s security practices.
The names, email address and phone numbers of over three million hotel guests
1. White Hat
2. Black Hat
3. Gray Hat
4. Black Hat
5. White Hat
Scenario 1
The hotel chain’s reputation.
Scenario 2
Weaknesses in the platform’s security practices.
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices.
Scenario 1: The names, email address and phone numbers of over three million hotel guests.
Scenario 2:
Weaknesses in the platform’s security practices.
Select the correct answer from the options and submit in the learning group.
1. After hacking into ATM systems remotely using a laptop, this attacker worked with the ATM manufacturers to resolve the identified security vulnerabilities.
Please select an option
° Gray hat
2. This attacker transferred $10 million into their bank account using customer account and PIN credentials gathered from recordings.
Please select an option
° Black hat
3. This attacker’s job is to identify weaknesses in a company’s computer system.
Please select an option
° White hat
4. This attacker used malware to compromise a company’s system and steal credit card information that was then sold to the highest bidder.
Please select an option
° Gray hat
5. While carrying out some research, this attacker stumbled across a security vulnerability on an organization’s network that they are authorized to access.
Please select an option
° White hat
2. The names, email address and phone numbers of over three million hotel guests.
1. Weaknesses in the platform’s security practices.
Scenario 1: The names, email address and phone numbers of over three million hotel guests.
Scenario 2. The username and password of all of the hotel’s employees
In the first scenario, the cyber-criminals used the username and password of one of the employees to get the information.
while in the second scenario, I believe the hackers used the Weaknesses in the platform’s security practices. Because how will they explain leaving vital information of their students in a publicly accessible platform.
1. Case 1:The names, email address and phone numbers of over three million hotel guests.
2. Case 2:Weaknesses in the platform’s security practices.
Hotel scenario: The names, email address and phone numbers of over three million hotel guests.
Student case scenario: Weaknesses in the platform’s security practices.
Scenario 1
The names, email address and phone numbers of over three million hotel guests
Scenario 2
Weaknesses in the platform’s security practices.
Scenario 1
The card payment information of over three million guests.
Scenario 2
Taking advantage of student information not being correctly validated on the platform.
Actually they had access through the card payment information
1. White
2. Black
3. Gery
4. White
5. Black
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices.
The names, email address and phone numbers of over three million hotel guests.
Scenario 1: The username and password of all of the hotel’s employees.
Scenario 2: Weaknesses in the platform’s security practices.
White hat
Black hat
White hat
Black hat
White hat
1:
The names, email address and phone numbers of over three million hotel guests.
2:
Weaknesses in the platform’s security practices.
Scenario 1:
The names, email address and phone numbers of over three million hotel guests.
Scenario 2:
Weaknesses in the platform’s security practices.
1.white
2.Black
3.Gray
4.Gray
5.White
scenario 1;i.The username and password of all of the hotel’s employees.
iiThe username and password of all of the hotel’s employees.
scenario 2; Weaknesses in the platform’s security practices.
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices.
1. White hat
2. Black hat
3. White hat
4. Black hat
5. White hat
Scenario 1
The hotel chain’s reputation
Scenario 2
Weaknesses in the platform’s security practices
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices.
1. The names, email address and phone numbers of over three million hotel guests.
2. Weaknesses in the platform’s security practices.
Q1: The names, email address and phone numbers of over three million hotel guests
Q2: Weaknesses in the platform’s security practices
1 The username and password of all of the hotel’s employees.
2. Weaknesses in the platform’s security practices.
Q1. The names, email address and phone numbers of over three million hotel guests.
Q2. Weaknesses in the platform’s security practices.
Answer to question 1; The username and password of all of the hotel’s employees.
Answer to question 2; Weaknesses in the platform’s security practices.
Q1. The names, email address and phone numbers of over three million hotel guests.
Q2. Weakness in the platform’s security practice.
1. The names, email address and phone numbers of over three million hotel guests.
2. Weaknesses in the platform’s security practices.
Q1. The username and password of all of the hotel’s employees.
Q2. Weaknesses in the platform’s security practices.
1. Gray hat
2.Black hat
3.White hat
4.Black hat
5.White hat
The names, email address and phone numbers of over three million hotel guests.
Weaknesses in the platform’s security practices.
Weaknesses in the platform’s security practice
Scenario 1
The names,email address and phone numbers of over three million hotel guests .
Scenario 2
Weaknesses in the platform security practices.
1. The names, email address and phone numbers of over three million hotel guests.
2. Weaknesses in the platform’s security practices.
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices.
1. The names, email address and phone numbers of over three million hotel guests.
2. Weaknesses in the platform’s security practices.
1. Gray hat
2. Black hat
3. White hat
4. Black hat
5. White hat
Scenario 1: The names, email address and phone numbers of over three million hotel guests.
Scenario 2: Weaknesses in the platform’s security practices.
The Colour of My Hat Questions and Answers
1. Grey Hat
2. Black Hat
3. White Hat
4. Black Hat
5. White Hat
Scenario 1: Answer – 2. The names, email address and phone numbers of over three million hotel guests.
Scenario 2: Answer – 1. Weaknesses in the platform’s security practices.
The username and password of all of the hotel’s employees.
The hotel chain’s reputation.
Weaknesses in the platform’s security practices.
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices.
The hotel chain’s reputation.
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices.
Senario 1
The names, email address and phone numbers of over three million hotel guests.
Senario 2
Weaknesses in the platform’s security practices.
Scenario 1
The username and password of all of the hotel’s employees.
Scenario 2
Weaknesses in the platform’s security practices.
Scenario 1 – The names, email address and phone numbers of over three million hotel guests.
Scenario 2 – Weaknesses in the platform’s security practices.
Scenario 1:
The names, email address and phone numbers of over three million hotel guests.
Scenario 2:
Weaknesses in the platform’s security practices
Scenario 1:
The names, email address and phone numbers of over three million hotel guests.
Scenario 2:
Weaknesses in the platform’s security practices.
Scenario 1: the hotel chain’s reputation
Scenario 2: weakness in the platform’s security practices
SCENARIO 2.
Weaknesses in the platform’s security practices.
Scenario 2
Weaknesses in the platform’s security practices.
The names, email address and phone numbers of over three million hotel guests.
Scenario 1
The username and password of all of the hotel’s employees.
Scenario 1.
The card payment information of over three million guests.
The names, email address and phone numbers of over three million hotel guests.
The hotel chain’s reputation.
Scenario 2.
Weaknesses in the platform’s security practices.
Bypassing the platform’s access control methods.
Scenerio 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices.
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices.
Bypassing the platform’s access control methods
The hotel chain’s reputation.
Scenario 1;
Answer: The hotel chain’s reputation
Scenario 2;
Answer: Weaknesses in the platform’s security practices.
Scenario 1
answer: The hotel chain’s reputation
Scenario 2
Answer: Weaknesses in the platform’s security practices
1. white hat
2. black hat
3. white hat
4. grey hat
5. white hat
Scenario 1
The username and password of all of
the hotel’s employees.
Scenario 2
The hotel chain’s reputation.
Weaknesses in the platform’s security practices.
Scenario 1
The hotel chain’s reputation.
The names, email address and phone numbers of over three million hotel guests.
Weaknesses in the platform’s security practices.
Weaknesses in the platform’s security practices.
The hotel chain’s reputation
The names, email address and phone numbers of over three million hotel guests.
Weaknesses in the platform’s security practices.
The names, email address and phone numbers of over three million hotel guests.
The names, email address and phone numbers of over three million hotel guests
Scenario 1-2
Scenario 2-1
first scenario
The card payment information of over three million guests.
The names, email address, and phone numbers of over three million hotel guests.
The hotel chain’s reputation.
The username and password of all of the hotel’s employees.
Second scenario
Weaknesses in the platform’s security practices.
Extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer.
Bypassing the platform’s access control methods.
Weakness in the platforms security practices.
Question 1
White hat
Question 2
Black hat
Question 3.
Gray hat
Question 4.
Gray hat
Question 5.
White hat
The card payment information of over three million guests
The names, email address and phone numbers of over three million hotel guests.
The username and password of all of the hotel’s employees.
Weaknesses in the platform’s security practices
Weaknesses in the platform’s security practices.
Weaknesses in the platform’s security practices.
The names, email address and phone numbers of over three million hotel guests.
Scenario1
The name,email address and phone numbers of over three million hotel guests.
Scenario2
Weaknesses in the platform security practices
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s
security practices.
Cyber Attackers
1. Gray hat
2. Black hat
3. White hat
4.Black hat
5.White hat
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices.
The names, email address and phone numbers of over three million hotel guests.
Weaknesses in the platform’s security practices.
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
The card payment information of over three million guests.
Scenario 2
Weaknesses in the platform’s security practices.
Scenario 1
* The names, email address and phone numbers of over three million hotel guests.
Scenario 2
* Bypassing the platform’s access control methods.
Cyber Attackers
1. Gray hat
2. Black hat
3. White hat
4. Black hat
5. White hat
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices.
Assignment for Day 1
Scenario 1: The names, email address and phone numbers of over three million hotel guests.
Scenario 2: Weaknesses in the platform’s security practices
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices.
Scenario 2:
Weaknesses in the platform’s security practices.
Scenario 1:
– The names, email address and phone numbers of over three million hotel guests.
– The hotel chain’s reputation
Scenario 2:
Weaknesses in the platform’s security practices
Weaknesses in the platform’s security practices.
1. Grey
2. Black
3. White
4. Grey
5. White
The names, email address and phone numbers of over three million hotel guests.
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices.
DAY 1 Assignment
Day 1- The names, email address and phone numbers of over three million hotel guests
SCENARIO 2-Weakness in the platform’s security practices.
1. White hat
2. Black hat
3. White hat
4. Black hat
5. Gray hat
Scenario 1 The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices.
The names, email address and phone numbers of over three million hotel guests.
Weaknesses in the platform’s security practices.
scenario 1
The hotel chain’s reputation.
scenario 2
Weaknesses in the platform’s security practices
Hello, am I the only one not seeing the quiz questions? I can only see the options.
The names, email address and phone numbers of over three million hotel guests.
Weaknesses in the platform’s security practices
Scenario 1
The hotel chain’s reputation.
Scenario 2:
Weaknesses in the platform’s security practices.
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices.
Scenario 1: The names, email address and phone numbers of over three million hotel guests.
Scenario 2: Weaknesses in the platform’s security practices.
1: White hat
2:Black hat
3:White hat
4:Black hat
5:Grey hat
Scenario 1: The username and password of all of the hotel’s employees.
Scenario 2: Taking advantage of student information not being correctly validated on the platform.
Scenario 1
The hotel chain’s reputation.
Scenario 2
Weaknesses in the platform’s security practices.
1. White hat
2. Black hat
3. Gray hat
4. Black hat
5. Gray hat
1. White hat
2. Black hat
3. White hat
4. Black hat
5. Grey hat
Scenario 1
The hotel chain’s reputation.
Scenario 2
Weaknesses in the platform’s security practices
scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices.
Scenario 1:
The names, email address and phone numbers of over three million hotel guests.
Scenario 2:
Extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer.
Scenario 2
Weaknesses in the platform’s security practices.
Scenario 1
1. The card payment information of over three million guests.
Scenario 2
Weaknesses in the platform’s security practices.
1. The names, email address and phone numbers of over three million hotel guests.
2. Weaknesses in the platform’s security practices.
3.
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices.
Scenario 1
The hotel chain’s reputation.
Scenario 2
Weaknesses in the platform’s security practices.
1. The card payment information of over three million guests.
2. Weaknesses in the platform’s security practices.
Extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer.
The hotel chain’s reputation
SCENARIO 1
The names, email address and phone numbers of over three million hotel guests.
The hotel chain’s reputation.
1. The hotel chain’s reputation.
2. Weaknesses in the platform’s security practices.
The names, email address and phone numbers of over three million hotel guests
Weaknesses in the platform’s security practices.
SCENARIO 1
The names, email address and phone numbers of over three million hotel guests.
SCENARIO 2
Bypassing the platform’s access control methods.
Scenario 1
The hotel chain’s reputation.
SWeaknesses in the platform’s security practices.cenario 2
Scenario 2
Weaknesses in the platform’s security practices.
The names, email address and phone numbers of over three million hotel guests.
Weaknesses in the platform’s security practices.
Case1
The names, email address and phone numbers of over three million hotel guests.
Case2
Weaknesses in the platform’s security practices.
The names, email address and phone numbers of over three million hotel guests.
Weaknesses in the platform’s security practices.
1. The names, email address and phone numbers of over three million hotel guests.
2. Weaknesses in the platform’s security practices.
CASE 1:
The names, email address and phone numbers of over three million hotel guests.
CASE 2:
Taking advantage of student information not being correctly validated on the platform.
The card payment information of over three million of guests
Weaknesses in the platform’s security practices.
Scenario 1. The hotel chain’s reputation.
Scenario 2. Weaknesses in the platform’s security practices
Scenario 1:The hotel chain’s reputation Scenario 2:Weaknesses in the platform’s security practices.
The hotel chain’s reputation
Weaknesses in the platform’s security practices.
Weaknesses in the platform’s security practices.
1. The names, email address and phone numbers of over three million hotel guests.
2. Weaknesses in the platform’s security practices.
1. White hat
2. Black hat
3. White hat
4. Black hat
5. Grey hat
1. The names, email address and phone numbers of over three million hotel guests.
2. Weaknesses in the platform’s security practices.
CASE 2: Weaknesses in the platform’s security practices.
CASE 1: The card payment information of over three million guests.
The names, email address and phone numbers of over three million hotel guests.
The hotel chain’s reputation.
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices
1.The names, email address and phone numbers of over three million hotel guests.
2.weaknesses in the platforms security practices.
Case 1
The hotel chain’s reputation.
Case 2
Weaknesses in the platform’s security practices.
SCENARIO 1
* The hotel’s chain reputation
* The username and password of all of the hotel’s employees
SCENARIO 2
* Weaknesses in the platform’s security practices.
* Bypassing the platform’s access control methods.
1. Greyhat
2. Blackhat
3. Whitehat
4. Blackhat
5. Whitehat
Case 1
The names, email address and phone numbers of over three million hotel guests.
Case 2
Weaknesses in the platform’s security practices.
CASE1;
The username and password of all of the hotel’s employees.
CASE2:
Weaknesses in the platform’s security practices.
The hotel chain’s reputation.
Bypassing the platform’s access control methods
1.The hotel chain’s reputation.
2.Weaknesses in the platform’s security practices.
1. The names, email address and phone numbers of over three million hotel guests.
2.Weaknesses in the platform’s security practices.
The username and password of all of the hotel’s employees.
Gray hat
Black hat
White hat
Black hat
Gray hat
The names, email address and phone numbers of over three million hotel guests.
Weaknesses in the platform’s security practices.
White hat
Black hat
Grey hat
Black hat
Grey hat
Scenario 1:
– The names, email address and phone numbers of over three million hotel guests.
Scenario 2
– Weaknesses in the platform’s security practices.
The card payment information of over three million guests.
The names, email address and phone numbers of over three million hotel guests.
The hotel chain’s reputation.
Weaknesses in the platform’s security practices.
The names, email address and phone numbers of over three million hotel guests
1. The names, email address and phone numbers of over three million hotel guests.
2. Weaknesses in the platform’s security practices.
Scenerio 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2:
Weaknesses in the platform’s security practices.
Scenario 1. The card payment information of over three million guests.
Scenario 2. Weaknesses in the platform’s security practices.
1. The names, email address, and phone numbers of over three million hotel guests.
2. Weaknesses in the platform’s security practices.
Scenario 1. The hotel chain’s reputation was taken.
Scenario 2. Weaknesses in the platform’s security practices.
Scenario 1: The username and password of all of the hotel’s employees.
Scenario 2: Weaknesses in the platform’s security practices.
Scenario 1. The hotel chain’s reputation was taken.
Scenario 2. Weaknesses in the platform’s security practices.
SCENARIO 1
The names, email address and phone numbers of over three million hotel guests.
The hotel chain’s reputation.
SCENARIO 2
Weaknesses in the platform’s security
practices.
Bypassing the platform’s access control methods.
Scenario 1
The username and password of all of the hotel’s employees.
The names, email addresses and phone numbers of over three million hotel guests.
The card payment information of over three million guests.
Scenario 2
The card payment information of over three million guests.
what is the color of your hat?
1 gray
2 black
3 white
4 black
5 white
Scenario 1
The hotel chain’s reputation.
Scenario 2
Weaknesses in the platform’s security practices.
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
The hotel chain’s reputation.
Scenario 2
Weaknesses in the platform’s security practices
Scenario 1
The names, email address and phone numbers of over three million hotel guests
Scenario 2
Weaknesses in the platform’s security practices
Weaknesses in the platform’s security practices.
The names, email address and phone numbers of over three million hotel guests.
Scenario 1
Scenario 1
The names, email addresses, and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices
1. The names, email address and phone numbers of over three million hotel guests.
2. Weaknesses in the platform’s security practices
Scenario 1
The names, email address and phone numbers of over three million hotel guests
Scenario 2
Weaknesses in the platform’s security practices.
Question 1
The names, email address and phone numbers of over three million hotel guests.
Question 2
Weaknesses in the platform’s security practices.
Scenario 1
The names, email addresses, and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices
Scenario 1:
The names, email address and phone numbers of over three million hotel guests.
Scenario 2:
Weaknesses in the platform’s security practices.
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices
The names, email address and phone numbers of over three million hotel guests
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices.
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices
The username and password of all of the hotel’s employees.
The names, email address and phone numbers of over three million hotel guests.
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices
The username and password of all of the hotel’s employees.
Weaknesses in the platform’s security practices.
Scenerio 1
The names, email address and phone numbers of over three million hotel guests
Weaknesses in the platform’s security practices
Scenerio 2
Weaknesses in the platform’s security practices.
The username and password of all of the hotel’s employees
Scenerio 1: The names, email address and phone numbers of over three million hotel guests.
Scenerio 2: Weaknesses in the platform’s security practices.
Scenario 1.
The names, email address and phone numbers of over three million hotel guests.
Scenario 2. Weaknesses in the platform’s security practices.
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
The hotel chain’s reputation
Scenario 2
Weaknesses in the platform’s security practices.
Scenario 2
Bypassing the platform’s access control methods.
Scenario 1. The names, email address and phone numbers of over a million hotel guests
Scenario 2. Extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer.
Scenario 1 The names, email address and phone numbers of over three million hotel guests.
Scenario 2 Weaknesses in the platform’s security practices.
1 > Gray hat
2> Black hat
3> White hat
4> Black hat
5> White hat
The names, email address and phone numbers of over three million hotel guests
Weaknesses in the platform’s security practices.
Scenario 1: The names, email address and phone numbers of over three million hotel guests.
The hotel chain’s reputation.
Scenario2: Weaknesses in the platform’s security practices
Scenario 1: The names, email address and phone numbers of over three million hotel guests
Scenario 2: Weaknesses in the platform’s security practices.
Scenario one: The names, email address and phone numbers of over three million hotel guests.
2.Weaknesses in the platform’s security practices.
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices.
Scenario 1……The names, email address and phone numbers of over three million hotel guests
Scenario 2……….×Weaknesses in the platform’s security practices.
2.The names, email address and phone numbers of over three million hotel guests
×Weaknesses in the platform’s security practices.
Scenario 2 : Weaknesses in the platform’s security practices.
Scenario 1 : The card payment information of over three million guests,
Scenario 1
The username and password of all of the hotel’s employees.
scenario 2
Weaknesses in the platform’s security practices.
1. Gray hat
2. Black hat
3. White hat
4. Black hat
5. White hat
1. White hat
2. Black hat
3. White hat
4. Gray hat
5. White hat
Scenario 1 – The names, email address and phone numbers of over three million hotel guests
Scenario 2 – Weakness in the platform’s security practices
The names, email address and phone numbers of over three million hotel guests
Weaknesses in the platform’s security practices.
1. Gray hat
2.Black hat
3.white hat
4.Black hat
5.white hat
1. The names, email address and phone numbers of over three million hotel guests.
2. Weaknesses in the platform’s security practices.
The hotel chain’s reputation.
1. White hat
2. Black hat
3. White hat
4. Black hat
5. Grey hat
The names, email address and phone numbers of over three million hotel guests.
Weaknesses in the platform’s security practices.
Weaknesses in the platform’s security practices.
Weaknesses in the platform’s security practices.
scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices.
1. White Hat Attakers
2. Black hat Attackers
3. White hat Attackers
4. Gray hat Attackers
5. white hat attackers
1. The card payment information of over three million guests.
Scenario 2
Weaknesses in the platform’s security practices.
1
The names, email address and phone numbers of over three million hotel guests.
2
1.White Hat
2. Black Hat
3. White Hat
4. Grey Hat
5. Black Hat
The names, email address and phone numbers of over three million hotel guests.
The names, email address and phone numbers of over three million hotel guests.
Day 2
1. White Hat
2. Black Hat
3. White Hat
4. Grey Hat
5. Black Hat
Scenario1.The card payment information of over three million guests.
Scenario 2. Weaknesses in the platform’s security practices.
1. Gray hat
2. Black hat
3. White hat
4. Black hat
5. White hat
Scenario 1:The card payment information of over three million guests.
Scenario 2:Weaknesses in the platform’s security practices.
1 White hat attackers
2 Black hat attackers
3 White hat attackers
4 Gray hat attackers
5 White hat attackers
Scenario 1. The names, email address and phone numbers of over three million hotel guests.
Scenario 2. Weaknesses in the platform’s security practices.
Okeleji Testimony
Day 1
Scenario 1:
The card payment information of over three million guests.
Scenario 2:
Weaknesses in the platform’s security practices.
The names, email address and phone numbers of over three million hotel guests.
The names, email address and phone numbers of over three million hotel guests.
Weaknesses in the platform’s security practices.
Scenario 1: The hotel chain’s reputation.
Scenario 2: Weaknesses in the platform’s security practices.
Scenario 1:The names, email address and phone numbers of over three million hotel guests.
Scenario 2:Weaknesses in the platform’s security practices.
Scenario 1: The names, email address and phone numbers of over three million hotel guests.
Scenario 2: Weaknesses in the platform’s security practices.
Scenario 1
The names, email address and phone numbers of over three million hotel guests
Scenario 2
Weaknesses in the platform’s security practices.
Scenario 1: The names, email address and phone numbers of over three million hotel guests.
Scenario 2: Weaknesses in the platform’s security practices.
The card payment information of over three million guests.
Weaknesses in the platform’s security practices.
SCENARIO 1
The names, email address and phone numbers of over three million hotel guests
SCENARIO 2
Taking advantage of student information not being correctly validated on the platform.
The names, email address and phone numbers of over three million hotel guests
Weaknesses in the platform’s security practices.
scenario 2
Vulnerability in the platform’s security practice.
Email address, names and phone numbers of over three million hotel guests.
The username and password of all of the hotel’s employees.
Taking advantage of student information not being correctly validated on the platform.
Scenario 1 The hotel chain’s reputation
Scenario 2 Weaknesses in the platform’s security practices.
The names, email address and phone numbers of over three million hotel guests.
Weaknesses in the platform’s security practices.
White
Gray
White
Black
White
The hotel chain’s reputation.
Extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer.
1. Gray hat
2. Black hat
3. White hat
4. Gray hat
5.White hat
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices.
1. The names, email address and phone numbers of over three million hotel guests.
2. Weaknesses in the platform’s security practices.
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Bypassing the platform’s access control methods.
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices.
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices.
Scenario 1.
The names, email address and phone numbers of over three million hotel guests.
Scenario 2.
Weaknesses in the platform’s security practices.
Scenario 1;
The names, email address and phone numbers of over three million hotel guests.
Scenario 2;
Weaknesses in the platform’s security practices.
Scenario 1:
The names, email address and phone numbers of over three million hotel guests.
Scenario 2:
Bypassing the platform’s access control methods.
Weaknesses in the platform’s security practices.
Scenario 1;
The names, email address and phone numbers of over three million hotel guests.
Scenario 2;
Weaknesses in the platform’s security practices.
Scenario 2
Weaknesses in the platform’s security practices.
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
1. Gray hat
2. Black hat
3. White hat
4. Black hat
5. White hat
The names, email address and phone numbers of over three million hotel guests.
Senerio 2
Taking advantage of student information not being correctly validated on the platform.
The names, email address and phone numbers of over three million hotel guests.
Scenario 1
The card payment information of over three million guests.
Scenario 2
Taking advantage of student information not being correctly validated on the platform.
Weaknesses in the platform’s security practices.
The names, email address and phone numbers of over three million hotel guests.
The hotel chain’s reputation.
The username and password of all of the hotel’s employees.
Weaknesses in the platform’s security practices.
The names, email address and phone numbers of over three million hotel guests.
The hotel chain’s reputation.
The username and password of all of the hotel’s employees.
The hotel chain’s reputation
1. The names, email address and phone numbers of over three million hotel guests
2. Weaknesses in the platform’s security practices
#1. The names, email address and phone numbers of over three million hotel guests
#2. Weaknesses in the platform’s security practices
1: Weaknesses in the platform’s security practices.
2: The username and password of all of the hotel’s employees.
Scenario 1;
The names, email address and phone numbers of over three million hotel guests.
Scenario 2;
Weaknesses in the platform’s security practices.
scenario 1
The names, email address and phone numbers of over three million hotel guests
The hotel chain’s reputation.
scenario 2
Weaknesses in the platform’s security practices
1. Gray hat
2. Black hat
3. White hat
4. Gray
5.White hat
Scenario 1 :The names, email address and phone numbers of over three million hotel guests.
Scenario 2:Weaknesses in the platform’s security practices.
White hat
Black hat
White hat
Black hat
Grey Hat
Scenario 1
2.The names, email address and phone numbers of over three million hotel guests.
Scenario 1: The card payment information of over three million guests.
Scenario 2: Weaknesses in the platform’s security practices.
1. The names, email address and phone numbers of over three million hotel guests.
2. Weaknesses in the platform’s security practices.
Scenario 1
The hotel chain’s reputation.
Scenario 2
Weaknesses in the platform’s security practices.
scenario 1
The names, email address and phone numbers of over three million hotel guests
scenario 2
Weaknesses in the platform’s security practices
Scenario 1
The card payment information of over three million guests.
The names, email address and phone numbers of over three million hotel guests.
The hotel chain’s reputation.
The username and password of all of the hotel’s employees.
Scenario 2
Weaknesses in the platform’s security practices.
Scenerio 1 it is unclear what the hackers took but only one thing is clearly taken
The hotel chain’s reputation.
Scenerio 2
Weaknesses in the platform’s security practices.
Scenario 1
The card payment information of over three million guests.
Scenario 2
Weaknesses in the platform’s security practices.
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 3
Weaknesses in the platform’s security practices.
Scenario 1
The names, email address and phone numbers of over three million hotel guests
Scenario2
Weakness in the platform’s security practices
1. The names, email address and phone numbers of over three million hotel guests.
2. Weaknesses in the platform’s security practices.
Scenario 2
Bypassing the platform’s access control methods.
Extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer.
Weaknesses in the platform’s security practices.
Scenario 1
The card payment information of over three million guests.
The username and password of all of the hotel’s employees.
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices.
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 1
The names, email address and phone numbers of over three million hotel guests
Scenario2
Weakness in the platform’s security practices
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices.
Day 2
Question 1 White hat
Question 2 Black hat
Question 3 Gray hat
Question 4 Gray hat
Question 5 White hat
Day 2
white hat
Black hat
White hat
Black hat
Gray hat
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices.
Day 1, Excercise 6, Ans:-
1a. The card payment information of over three million guests.
2a. Weaknesses in the platform’s security.
2b. Bypassing the platform’s access control methods.
Scenario 1: The names, email address and phone numbers of over three million hotel guests.
Scenario 2: Weaknesses in the platform’s security practices.
Scenario 1
The hotel chain’s reputation.
Scenario 2
Weaknesses in the platform’s security practices.
Day 1
Q1. The hotel chain’s reputation.
Q2. Weaknesses in the platform’s security practices.
The names, email address and phone numbers of over three million hotel guests.
Weaknesses in the platform’s security practices.
Scenario 1:
The names, email address and phone numbers of over three million hotel guests.
Scenario 2:
Weaknesses in the platform’s security practices.
Day 1
Answer for Q1
The hotel chain’s reputation
Answer for Q2
Weaknesses in the platform’s security practices.
Day 2
1. Gray Hat
2. Black Hat
3. White Hat
4. Black Hat
5. White hat
Question 1: The names, email address and phone numbers of over three million hotel guests.
Question 2: Weaknesses in the platform’s security practices.
Day One Assignment:
Scenario 1: The hotel chain’s reputation
Scenario 2:Weaknesses in the platform’s security protection
Day 2
1. Gray Hat
2. Black Hat
3. White Hat
4. Black Hat
5. White hat
Scenario 1: The names,email address and phone numbers of over three million hotel guests.
Scenario 2: Weakness in the platform’s security practices.
Weaknesses in the platform’s security practices.
The names, email address and phone numbers of over three million hotel guests
Day 2 answer: what’s the color of my hat?
question 1 – White hat
question 2 – Black hat
question 3 – White hat
question 4 – grey hat
question 5 – White hat
Day 2
Question 1 Grey hat
Question 2 Black hat
Question 3 White hat
Question 4 Black hat
Question 5 White hat
Day 2 Answer; What colour is my hat?
1. Gay hat
2. Black hat
3. White hat
4. Black hat
5. White hat
Scenario 1: The names,email address and phone numbers of over three million hotel guests.
Scenario 2: Weakness in the platform’s security practices.
Day 2 Answers – What Color is my hat?
1. White hat
2. Black hat
3. White hat
4. Gray hat
5. White hat
Weaknesses in the platform’s security practices
White hat
Black hat
White hat
Black hat
Gray hat
Scenario 1: The names, email address and phone numbers of over three million hotel guests.
Scenario 2: Weaknesses in the platform’s security practices.
Scenario one;
2. The names, email address and phone numbers of over three million hotel guests.
Scenario two;
* Weaknesses in the platform’s security practices.
Scenario 1
•The card payment information of over three million guests.
•The names, email address and phone numbers of over three million hotel guests.
Scenario 2
•Bypassing the platform’s access control methods.
Scenerio 1 – The names, email address and phone numbers of over three million hotel guests.
Scenerio 2 – Weeknesses in the platform’s security practices
Senerio 1
The card payment information of over three million guests.
Senerio 2
Weaknesses in the platform’s security practices.
1. Gray hat
2. Black hat
3.white hat
4. Black hat
5. White hat
Scenario 1- The card payment information of over three million guests.
Scenario 2- Bypassing the platform’s access control methods.
Scenario one;
The names, email address and phone numbers of over three million hotel guests.
Scenario two;
Weaknesses in the platform’s security practices.
1. Gray hat
2. Black hat
3. Gray hat
4. Black hat
5.White hat
1. The names, email address and phone numbers of over three million hotel guests.
2. Weaknesses in the platform’s security practices.
Scenario 1: The card payment information of over three million guests.
Scenario 2; Weaknesses in the platform’s security practices.
1. White hat
2. Black hat
3. Gray hat
4. Black hat
5.Gray hat
1. The names, email address and phone numbers of over three million hotel guests.
2.Weaknesses in the platform’s security practices.
Scenario 1-The names, email address and phone numbers of over three million hotel guests
Scenario 2-Bypassing the platform’s access control methods.
White hart
Black hart
Grey hart
Black hart
Grey hart
Weaknesses in the platform’s security practices.
The names, email address and phone numbers of over three million hotel guests.
scenario 1: The username and password of all of the hotel’s employees.
scenario 2: Taking advantage of student information not being correctly validated on the platform.
——-The username and password of all of the hotel’s employees.
——— Weaknesses in the platform’s security practices.
1. The names, email address and phone numbers of over three million hotel guests.
2.Weaknesses in the platform’s security practices.
The hotel chain’s reputation
Weaknesses in the platform’s security practices.
White Hat
Black Hat
White Hat
Grey Hat
White Hat
The names, email address and phone numbers of over three million hotel guests.
Weaknesses in the platform’s security practices.
1. White hat.
2. Black hat.
3. White hat.
4. Gray hat.
5. Gray hat.
1. The hotel chain’s reputation.
2. Weaknesses in the platform’s security practices.
The card payment information of over three million guests.
The names, email address and phone numbers of over three million hotel guests.
Weaknesses in the platform’s security practices.
The names, email address and phone numbers of over three million hotel guests.
Weaknesses in the platform’s security practices.
The names, email address and phone numbers of over three million hotel guests.
Weaknesses in the platform’s security practices.
White Hat
Black Hat
White Hat
Grey Hat
White Hat
The card payment information of over three million guests.
The names, email address and phone numbers of over three million hotel guests.
Weaknesses in the platform’s security practices.
1. The hotel chain’s reputation.
2. Weaknesses in the platform’s security practices.
The students full name, email address , phone number and enrollment details.
1. The names, email address and phone numbers of over three million hotel guests.
2. Weaknesses in the platform’s security practices.
Best place to be
The names, email address and phone numbers of over three million hotel guests.
Weaknesses in the platform’s security practices.
The names, email address and phone numbers of over three million hotel guests.
Scenario 1: The names, email address and phone numbers of over three million hotel guests
Scenario 2: Bypassing the platform’s access control methods, Weaknesses in the platform’s security practices.
Scenario 1: The names, email address and phone numbers of over three million hotel guests.
Scenario 2: Bypassing the platform’s access control methods, Weaknesses in the platform’s security practices
1. White hat
2. Black hat
3. White hat
4. Black hat
5. Gray hat
Cyber security: Day 2 Assignment
Scenario 1:
The hotel chain’s reputation.
Scenario 2:
Weaknesses in the platform’s security practices.
1: Gray Hat
2: Black Hat
3: White Hat
4: Black Hat
5: White Hat
The username and password of all of the hotel’s employees.
Weaknesses in the platform’s security practices.
Scenario 1: The hotel chain’s reputation.
Scenario 2:Taking advantage of student information not being correctly validated on the platform.
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Senario 2
Weaknesses in the platform’s security practices.
Scenario 1
1. The card payment information of over three million guests.
Senario 2
Weaknesses in the platform’s security practices.
Scenario 1
1. The card payment information of over three million guests.
Senario 2
Weaknesses in the platform’s security practices.
Scenario 1
1. The names, email address and phone number of over 3 million hotel guests.
Scenario 2
2. Weakness in the platforms security practices
Scenario 1: The username and password of all of the hotel’s employees.
Scenario 2: Weaknesses in the platform’s security practices
Weaknesses in the platform’s security practices was exploited by the hackers in obtaining important student information in the second scenario.
Scenario 1.The hotel chain’s reputation
Scenario 2.Extracting information when the volume of student data exceeds the storage
Weaknesses in the platform’s security practices.
Scenario 1: The employee username and password as well as the names, email address of the customers were taken
scenario 1
The names, email address and phone numbers of over three million hotel guests
scenario 2
Weaknesses in the platform’s security practices.
Scenario 1: The names, email address and phone numbers of over three million hotel guests.
Scenario 2: Weaknesses in the platform’s security practices.
scenario 1; The names, email address and phone numbers of over three million hotel guests
scenario 2; Weaknesses in the platform’s security practices.
Scenario 1: The username and password of all of the hotel’s employees.
Scenario 2:Weaknesses in the platform’s security practices.
Scenario 1
The names, email addresses, and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices.
Scenario 1 : The names, email address and phone numbers of over three Million hotel guests.
Scenario 2: Weaknesses in the platforms security practices.
Scenario 1
The hotel chain’s reputation.
Scenario 2
Weaknesses in the platform’s security practices
Scenario 1 : The names, email address and phone numbers of over three Million hotel guests.
Scenario 2: Weaknesses in the platforms security practices.
Scenario 2: Weaknesses in the platform’s security practices.
Scenario 1: The hotel chain’s reputation.
The names, email address and phone numbers of over three million hotel guests.
The hotel chain’s reputation.
scenario 1;
The Hotel’s chain reputation
scenario 2;
Weakness in the platform’s security practices
Scenario 1: The username and password of all of the hotel’s employees.
Scenario 2:Weaknesses in the platform’s security practices.
Scenero 1:
The hotel chain’s reputation.
Scenero 2:
Weaknesses in the platform’s security practices.
Scenario 1;The username and password of all of the hotel’s employees.
Scenario 2; Weaknesses in the platform’s security practices.
SCENARIO 1;The username and password of all of the hotel’s employees.
SCENARIO 2; Weaknesses in the platform’s security practices.
1. The hotel chain’s reputation.
2. Weaknesses in the platform’s security practices
Scenario 1
The hotel chain’s reputation
Scenario 2
Extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer.
Taking advantage of student information not being correctly validated on the platform.
The names, email address and phone numbers of over three million hotel.
The names, email address and phone numbers of over three million hotel guests.
Weaknesses in the platform’s security practices.
Scenario 1:
The names, email address and phone numbers of over three million hotel guests.
Scenario 2:
Weaknesses in the platform’s security practices.
The names, email address and phone numbers of over three million hotel guests.
Scenario 1:
3. The hotel chain’s reputation.
Scenario 2:
1. Weaknesses in the platform’s security practices.
scenario 1;
The Hotel’s chain reputation
scenario 2;
Weakness in the platform’s security practices
WHAT COLOR IS MY HAT?
Gray
black
white
black
white
Scenario 1
The card payment information of over three million guests.
Scenario 2
Weaknesses in the platform’s security practices.
The names, email address and phone numbers of over three million hotel guests
Weaknesses in the platform’s security practices
Scenario 1: The hotel chain’s reputation
Scenario 2: Weaknesses in the platform’s security practices.
Day 2
1.gray hat
2. black hat
3.white hat
4.black hat
3.white hat
Scenario 1, The names, email address and phone numbers of over three million hotel guests.
Scenario 2, Weaknesses in the platform’s security practices.
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices.
Day 1
Scenario 1 The hotel chain’s reputation
Scenario 2
Weaknesses in the platform’s security practices.
Cyber security: Day 2 Assignment
Scenario 1 : The hotel chain’s reputation.
Scenario 2 : Weaknesses in the platform’s security practices.
Scenario: What color is my hat?
1. Gray hat
2. Black hat
3. White hat
4. Black hat
5. White hat
Day 2
1.gray hat
2. black hat
3.white hat
4.black hat
3.white hat
Scenario 1, The names, email address and phone numbers of over three million hotel guests.
Scenario 2, Weaknesses in the platform’s security practices.
Scenario 1. The names, email address and phone numbers of over three million hotel guests.
Scenario 2.Weaknesses in the platform’s security practices.
Day 2
1.Gray hat
2.Black hat
3.White hat
4.Black hat
5.White hat
Scenario 1:
Answer: the hotel chain’s reputation
Scenario 2:
Answer: the hackers exploited weaknesses in the platform’s security practices
Scenario 1:
Ans; the hotel chain’s reputation
Scenario 2:
Ans; the hackers exploited weaknesses in the platform’s security practices
The names, email address and phone numbers of over three million hotel guests.
Taking advantage of student information not being correctly validated on the platform.
1. The names, email address and phone numbers of over three million hotel guests.
2. Weaknesses in the platform’s security practices.
1. The names, email address and phone numbers of over three million hotel guests.
2.Weaknesses in the platform’s security practices.
1 The card payment information of over three million guests.
2 Weaknesses in the platform’s security practices.
Day 1 : discussion assignment
Scenario 1
– hotel’s chain’s reputation.
-the names, email address and phone numbers of over three million hotel guests.
Scenario 2
– weakness in the hotel’s platforms security practices
Day 2: what colour is my hat?
1-gray hat
2-black hat
3-white hat
4-gray hat
5-white hat
Scenerio 1- The username and password of all of the hotel’s employees.
Scenrio 2- Weaknesses in the platform’s security practices.
Scenario 1 – The hotel chain’s reputation
Scenario 2 –
Weaknesses in the platform’s security practices.
MODULE 1 ASSIGNMENT(No2) ANSWERS.
1. WHITE HAT
2. BLACK HAT
3. WHITE HAT
4. GRAY HAT
5. GRAY Hat
1) white hat
2) black hat
3) white hat
4) black hat
5) gray hat
Scenario 1: The names, email address and phone numbers of over three million hotel guests.
Scenario 2: Weaknesses in the platform’s security practices.
Scenario 1: The names, email address and phone numbers of over three million hotel guests.
Scenario 2: Weaknesses in the platform’s security practices.
Scenario 1 > The names, email address and phone numbers of over three million hotel guests.
Scenario 2 > Weaknesses in the platform’s security practices.
Senerio one answer:names, email address and phone numbers of over three million hotel guests.
Senerio two answer:Weaknesses in the platform’s security practices.
Scenario 1: The names, email address and phone numbers of over three million hotel guests.
Scenario 2: Weaknesses in the platform’s security practices.
Scenario 1
The names, the Email Address, the Phone Numbers of over three million hotel guests.
Scenario 2
Weakness in the platform’s security practices.
Day 2 assignment
What color is my hat?
1. Gray hat
2 Black hat
3. White hat
4. Gray hat
5. White hat
The names, email address and phone numbers of over three million hotel guests.
Weaknesses in the platform’s security practices.
Scenario 1:The names, email address and phone numbers of over three million hotel guests.
Scenario 2: Weaknesses in the platform’s security practices.
The card payment information of over three million guests.
Bypassing the platform’s access control methods.
The names, email address and phone numbers of over three million hotel guests
Taking advantage of student information not being correctly validated on the platform.
Scenario 1
The names, email address and phone numbers of over three million hotel guests
Scenario 2
Weaknesses in the platform’s security practices
Day 2
1. White hat
2. Black hat
3. White hat
4. Black hat
5. Gray hat
Weakness in the hotel’s platform’s security
Weaknesses in the platform’s security practices.
Weaknesses in the platform’s security practices.
Weaknesses in the platform’s security practices.
This is the answer for Scenario 2
MODULE 1 ASSIGNMENT 2 ANSWERS
1. WHITE HAT
2. BLACK HAT
3. WHITE HAT
4. GRAY HAT
5. GRAY HAT
The card payment information of over three million guests
The hotel chain’s reputation.
Weaknesses in the platform’s security practices
DAY 1
1. The names, email address and phone numbers of over three million hotel guests.
2. Weaknesses in the platform’s security practices
Day2
1.white hat
2.Black hat
3.white hat
4.Gray hat
5.white hat
Day 2
Gray Hat
Black Hat
White Hat
Black Hat
White Hat
The username and password of all of the hotel’s employees.
2. Weaknesses in the platform’s security practices.
1. The card payment information of over three million guests.
2. Weaknesses in the platform’s security practices.
Scenario 1: The names, email address and phone numbers of over three million hotel guests.
Scenario 2: Weaknesses in the platform’s security practices.
Scenario 1: The names, email address and phone numbers of over three million hotel guests.
Scenario 2: Weaknesses in the platform’s security practices.
DAY2 ASSIGNMENT
1. White hat
2. Black hat
3. White hat
4. Black hat
5. White hat
scenario 1: The names, email address and phone numbers of over three million hotel guests
scenario 2: Weaknesses in the platform’s security practices.
Scenario 1 – The names, email address and phone numbers of over three million hotel guests.
Scenario 2 – Weaknesses in the platform’s security practices.
Scene 1
The hotel chain’s reputation.
Scene 2
Weaknesses in the platform’s security practices.
1) The names, email address and phone numbers of over three million hotel guests.
2) Bypassing the platform’s access control methods.
3)
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices.
MODULE 1 ASSIGNMENT
Scenario 1
ANSWER: The names, email address and phone numbers of over three million hotel guests.
Scenario 2
ANSWER: Bypassing the platform’s access control methods.
day 1
1. The names, email address and phone numbers of over three million hotel guests.
2. Weaknesses in the platform’s security practices.
In scenerio 1, the names, emails and phone numbers, and payment details of every of their customer was taken and if the information is used it would cost the hotel their reputation.
In scenerio 2, the hackers exploited the weakness in the platforms security practices.
Scenerio 1. The names, email address and phone numbers of over three million hotel guests.
Scenario 2. Weaknesses in the platform’s security practices.
Scenario 1:
*The hotel chain’s reputation.
*The names, email address and phone numbers of over three million hotel guests
Scenario 2:
*Weaknesses in the platform’s security practices
Scenario 1 – The hotel chain’s reputation.
Scenario 2 – Weaknesses in the platform’s security practices
1. Gray hat
2. Black hat
3. White hat
4. Black hat
5. White hat
1. White hat
2. Black hat
3. White hat
4. Black hat
5. Gray hat
Scenerio 1. The names, email address and phone numbers of over three million hotel guests.
Scenario 2. Weaknesses in the platform’s security practices.
In scenario 1. The names, email address and phone numbers of over three million hotel guests.
Scenario 2. Weaknesses in the platform’s security practices.
Question 1. The names, email address and phone numbers of over three million hotel guests
Question 2, Bypassing the platform’s access control methods.
Day 2
1. White Hat
2. Black Hat
3. White Hat
4. Gray Hat
5. White hat
ASSIGNMENT 2
1. Gray Hat Attacker
2. White Hat Attacker
3. Black Hat Attacker
4. Black Hat Attacker
5. White Hat Attacker
Scenario 1
The hotel chain’s reputation.
Scenario 2
Weaknesses in the platform’s security practices.
In scenerio 1, the names, emails and phone numbers, and payment details of every of their customer was taken and if the information is used it would cost the hotel their reputation.
In scenerio 2, the hackers exploited the weakness in the platforms security practices.
Q1.The names, email address and phone numbers of over three million hotel guests.
Q2. Weaknesses in the platform’s security practices.
ASSIGNMENT 2
1. White Hat Attacker
2. Black Hat Attacker
3. White Hat Attacker
4. Gray Hat Attacker
5. White Hat Attacker
White Hat
Grey Hat
White Hat
Black Hat and
White Hat
ASSIGNMENT 2
1. WHITE HAT
2. BLACK HAT
3. WHITE HAT
4. BLACK HAT
5. WHITE HAT
The card payment information of over three million guests.
Weaknesses in the platform’s security practices.
1. Gray hat
2. Black hat
3. White hat
4. Black hat
5. White hat
Scenario 1:
1. The card payment information of over three million guests
2. The names, email address and phone numbers of over three million hotel guests
3. The hotel chain’s reputation
Scenario 2:
. Weaknesses in the platform’s security practices.
ASSIGNMENT 2
1. White Hat
2. Black Hat
3. Gray Hat
4. Black Hat
5. White Hat
Q1.The hotel chain’s reputation.
Q2. Weaknesses in the platform’s security practices.
In scenerio 1, the names, emails and phone numbers, and payment details of every of their customer was taken and if the information is used it would cost the hotel their reputation.
In scenerio 2, the hackers exploited the weakness in the platforms security practices.
Scenarios 1: The names, email address and phone numbers of over three million hotel guests.
Scenarios 2: Weaknesses in the platform’s security practices.
Question 2:
1. White
2. Black
3. White
4. Gray
5. White
In scenerio 1, the names, emails and phone numbers, and payment details of every of their customer was taken and if the information is used it would cost the hotel their reputation.
In scenerio 2, the hackers exploited the weakness in the platforms security practices.
In the first scenario, the hackers took the names, email addresses, and phone numbers of over three million hotel guests.
In the second scenario, the hackers gained access to the personal data of millions of students, including their full names, email addresses, phone numbers, and school enrollment details.
ASSIGNMENT 2
1. White Hat
2. Black Hat
3. White Hat
4. Black Hat
5. Gray Hat
Second Assignment
1. White hat
2. Gray hat
3. Gray hat
4. Black hat
5. Gray hat
Second Assignment:
1. White hat
2. Black hat
3. Gray hat
4. Black hat
5. White hat
In Scenario 1, it is safe to say the hackers took all the options. The names, email address and phone numbers of all the guests; probably not all customers card payment information as some might have paid via cash, but for most customers especially in this e-payment oriented times. the hotel’s reputation too is being questioned and access to an employee’s username and password implies others might have been compromised.
For Scenario 2, it is clear that the hackers used the weakness in the platform’s security practices to gain access to valuable personal information of the students due to its exposure on a publicly accessible cloud database without an access control method.
Senerio one
The security took the name, email and phone number of the customer from the hotel site.
Senerio two
Weakness in the platform security.
1.The names, email address and phone numbers of over three million hotel guests.
2. The hotel chain’s reputation.
3. Weaknesses in the platform’s security practices.
1.
The hotel chain’s reputation
2.
Weaknesses in the platform’s security practices.
Scenerio 1:
The names, email address and phone numbers of over three million hotel guests
Scenerio 2:
Bypassing the platform’s access control methods.
ASSIGNMENT 2
1. White and Gray hat
2. Black hat
3. Gray hat
4. Black hat
5. White and Gray hat
Scenario 1: The hotel chain’s reputation was taken
Scenario 2: Weaknesses in the platform’s security practices was exploited
Scenario 1: The card payment information of over three million guests.
The names, email address and phone numbers of over three million hotel guests.
The hotel chain’s reputation.
The username and password of all of the hotel’s employees.
Scenario 2: Weaknesses in the platforms security practices.
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices.
Scenario 1
The names,email addresses and phone numbers
Scenario 2
Weaknesses in the platform security practices
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices.
The names, email address and phone numbers of over three million hotel guests.
Weaknesses in the platform’s security practices.
1. Gray hat
2. Black hat
3. White hat
4. Gray hat
5. White hat
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices.
Scenario 1:
Option 1,2,3
Scenario 2:
Weaknesses in the platform’s security practices
Scenario 1 :
The names, email address and phone numbers of over three million hotel guests
Scenario 2:
The weakness in the platform’s security practices.
Scenario 2:
Weakness in the platform security practices
Scenario 1
The hotels reputation
The username and password of the hotel employees
Scenario 2
Weakness in the platform securities
These are my submission.
Scenario 1:
What did the hackers take?
The card payment information of over three million guests.
The names, email address and phone numbers of over three million hotel guests.
The hotel chain’s reputation.
The username and password of all of the hotel’s employees.
Scenario 2:
What exploits did the hackers use to gain access to valuable personal information?
Weaknesses in the platform’s security practices.
Gray hat
Black hat
1=gray hat
2=black hat
3=white hat
4=black hat
5=gray hat
In Scenario 1:
What did the hackers take?
The names, email address, and phone numbers of over three million hotel guests.
In Scenario 2:
What exploits did the hackers use to gain access to valuable personal information?
Weaknesses in the platform’s security practices.
White hat
Scenario 1
Security breaches today are all too common, with attackers constantly finding new and innovative ways of infiltrating organizations in search of valuable information.
Scroll down to read the latest breaking security news headline.
What Happened?
According to our sources, a well known hotel chain that operates across the world has reported a massive data breach, with the personal information of over three million guests exposed to hackers.
The hotel discovered that hackers gained access to its customer database by using the login details of one of its employees.
At this point, the hotel doesn’t believe that the hackers were able to access any account passwords or financial information. Recent guests are encouraged to check the hotel chain’s web portal to see if they have been impacted by this breach.
*This is a fictional scenario.
This is a multiple choice question. Once you have selected an option, select the submit button below to submit your answer.
In this example, what did the hackers take?
Select the correct answer, then Submit.
The card payment information of over three million guests.
The names, email address and phone numbers of over three million hotel guests.
The hotel chain’s reputation.
The username and password of all of the hotel’s employees.
Scenario 2
eLearning Platforms at Risk!
The team at DEXA is concerned. eLearning platforms are becoming prime targets for attackers as more and more organizations make the move to digital learning.
SCROLL down to find out more about a recent case.*
A popular online training platform admitted leaving the personal data of millions of its students (many of them minors) exposed on a publicly accessible cloud database.
Hackers were able to directly access students’ full names, email addresses, phone numbers, and school enrollment details from the Internet!
While it’s unclear what the hackers have done with this acquired information, it’s safe to say that they have everything they need to carry out widespread phishing or malware attacks.
What Exploits?
What exploits did the hackers use in this case to gain access to valuable personal information?
Select the correct answer, then Submit.
Weaknesses in the platform’s security practices.
Extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer.
Bypassing the platform’s access control methods.
Taking advantage of student information not being correctly validated on the platform.
Post
ChatGPT
In Scenario 1:
What did the hackers take?
The names, email address, and phone numbers of over three million hotel guests.
In Scenario 2:
What exploits did the hackers use to gain access to valuable personal information?
Weaknesses in the platform’s security practices.
White hat
Assignment 2
Gray hat
Black hat
White hat
Gray hat
White hat
White hat
Scenario 1: The hotel chain’s reputation
Scenario 2: Weaknesses in the platform’s security practices
Question 1 – white hat
Question 2 – black hat
Question 3 – gray hat
Question 4 – black hat
Question 5 – white hat
Scenario 1
The Hotel chain reputation
The name, email address and phone numbers of over 3 million hotel guests
Scenario 2
Weakness in the platform security practices
Hello Support Team,
These scenarios and the answers or options are not selectable in Day 1 Task.
Please, kindly assist with rectifying these issues
Day 1 assessment
Scenario 1
The names,email address and phone numbers of over 3million hotel guest
Scenario 2
Weakness in the platform security practices
Day 1. Assessment:
Scenario I- The names, Email address and phone numbers of over three million hotel guests.
Scenario II – weaknesses in the platform’s security practices.
Scenario 1- The names, email address and phone numbers of over three million hotel guests
Scenario 2- weaknesses in the platform’s security practice
Day 1 Assessment:
Scenario I- The names, Email address and phone numbers of over three million hotel guests.
Scenario II – weaknesses in the platform’s security practices.
Day 1 Assessment:
Scenario 1. The names, Email address and phone numbers of over three million hotel guests.
Scenario 2. weaknesses in the platform’s security practices.
Day 1 assignment;
Scenario one : The hotel’s reputation
Scenario two:weakness in the platform security practise
assignment 2
gray hat
black hat
white hat
gray hat
white hat
Day one assignment:
Scenario 1: The names, email address and phone numbers of over three million hotel guests.
Scenario 2: Weaknesses in the platform’s security practices.
Day 1 assignment
Scenario 1: The names, email address and phone numbers of over three million hotel guests.
Scenario 2: Weaknesses in the platform’s security practices.
Day 1 Assignment;
Answers to the Questions
Scenario 1: The name, email address and phone numbers of over 3million hotel guests.
Scenario 2; Weakness in the platform’s security practices.
Day one assignment
Scenario 1: The hotel chain’s reputation
Scenario 2:Weaknesses in the platform’s security protection
Day One Assignment:
Scenario 1: The hotel chain’s reputation
Scenario 2:Weaknesses in the platform’s security protection
Scenario 1: The hotel chain’s reputation
Scenario 2:Weaknesses in the platform’s security protection
Cyber Security: Day 1 Assignment
Scenario 1: The names, email address and phone numbers of over three million hotel guests.
Scenario 2: Weaknesses in the platform’s security practices.
Cyber Security: Day 2 Assignment
White hat
Black hat
White hat
Black hat
Gray hat
Scenario 1:
The hotel chain’s reputation
Scenario 2:
Weaknesses in the platform’s security practices
Ans 1. Names, Email addresses, and Phone numbers of 3 million + hotel guests
Ans 2. Weakness in the Platforms Security practices
Ans 1. Names, Email addresses, and Phone numbers of 3 million + hotel guests
Ans 2. Weakness in the Platforms Security practices
Scenario 1: The names, email address, and phone numbers of over three million hotel guests.
Scenario 2: Weaknesses in the platform’s security practices.
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
The card payment information of over three million guests.
Scenario 2
Weaknesses in the platform’s security practices.
1. Name, email and phone number of 3million + clients
2. The security of the platform is not good
1. The names,email address and phone numbers of over 3 million hotel guests.
2. Weakness in the platforms security practices.
Ans 1. Names, Email addresses, and Phone numbers of 3 million + hotel guests
Ans 2. Weakness in the Platforms Security practices
scenario 1
3. The hotel chain’s reputation
scenario 2
1. Weaknesses in the platform’s security practices.
1. Names, Email addresses, and Phone numbers of 3 million + hotel guests
2. Weakness in the Platforms Security practices
1.The names, email address and phone numbers of over three million hotel guests
2.Weaknesses in the platform’s security practices.
Scenario 1 : The hotel chain’s reputation
Scenario 2 : Taking advantage of student information not being correctly validated on the platform.
Sunday Nathaniel Ngwamah
Scenario 1:
3. The hotel chain’s reputation.
Scenario 2:
Weaknesses in the platform’s security practices
Day 1
1. The names, email address and phone numbers of the hotel guests
2. Weakness in the platform’s security practices
1.The names, email address and phone numbers of over three million hotel guests
2.Weaknesses in the platform’s security practices
Scenerio 1: The names,email address and phone numbers of over 3 million hotel guests and the card payment information of over 3 million guests
Scenerio 2: Weakness in the platforms security practices and extracting information when the volume of the students data exceeds the storage capacity of the platforms memory buffer
1.The names, email address and phone numbers of over three million hotel guests
2.Weaknesses in the platform’s security practices
1.DAY 1
Scenerio 1: The names, email address and phone numbers of over three million hotel guests.
Scenario 2: Weaknesses in the platform’s security practices.
DAY 1
Scenario 1: The names, email address and phone numbers of over three million hotel guests.
Scenario 2: Weaknesses in the platform’s security practices.
Scenario 1:
The names, email address and phone number of three million hotel guest
DAY 1
Scenerio 1: The names, email address and phone numbers of over three million hotel guests.
Scenerio 2: Weaknesses in the platform’s security practices.
Day 1
Scenerio 1
The names, email address and phone numbers of over three million hotel guests.
Scenerio 2
Weaknesses in the platform’s security practices.
DAY 1
Scenerio 1: The names, email address and phone numbers of over three million hotel guests.
Scenerio 2: Weaknesses in the platform’s security practices.
DAY1
Scenario 1: The card payment information of over three million guests.
Scenario 2: Weaknesses in the platform’s security practices.
The weakness in the platform’s security process
DAY 2 :
1 – White hat
2 – Black hat
3- White hat
4 – Black hat
5 – Gray hat
DAY 1
Assignment please.
Scenario 1. The names, email address and phone numbers of over three million hotel guests.
Scenario 2.Weaknesses in the platform’s security practices.
Scenario 1. The hotel chain’s reputation.
Scenario 2. Weaknesses in the platform’s security practices.
Black Hat
Gray Hat
White Hat
1) The hotel chains reputation 2) weakness in the platform security practices
Scenario 1, The Hotels’ reputation was tarnished. the hackers took and manipulated the guest’s personal information such, names, address, phone number.
Scenario 2, Shows there’s vulnerability in the security practice of the hotel which the hacker explored to carry out their illegal act.
Scenario 1 -The hotel chain’s reputation.
Scenario 2- Weaknesses in the platform’s security practices
The exploit used by the hackers in this case is the “Weaknesses in the platform’s security practices”.
Discussion assignment
Scenario 1
The hotel chains reputation
Scenario 2
Weaknesses in the platform’s security practices.
DAY 1
SCENARIO 1
[ 2] The hackers took the name, email address and phone numbers of over three million hotel guests.
SCENARIO 2
Weakness in the platforms security practices .
The hacker took the names, email address and phone numbers of over three million hotel guests.
Scenerio 1
The hackers took the name, email address and phone numbers of over three million hotel guests.
SCENARIO 2
The exploit used by the hackers in this case is the “Weaknesses in the platform’s security practices”.
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practice
The hotel chain’s reputation.
Weaknesses in the platform’s security practices.
Scenario 1: The card payment information of over three million guests.
Scenario 2: Weaknesses in the platform’s security practices.
1 White hat
2 Black hat
3 White hat
4 Black hat
5 Gray hat
Scenario 1, The names, email address and phone numbers of over three million hotel guests
Scenario 2, Weaknesses in the platform’s security practices.
1. The hotel chain reputations.
2. Weakness in the platforms security practices.
No 1.
The username and password of all of the hotel’s employees.
No2.
Weaknesses in the platform’s security practices.
1. White hat attacker
2. Black hat attacker
3. White hat attacker
4. Gray hat attacker
5. White hat attacker
Scenario 1: The username and password of all of the hotel’s employees
Scenario 2: Weaknesses in the platform’s security practices
White hat
Black hat
Gray hat
Black hat
Gray hat
Scenario 1: The hotel chain’s reputation Scenario 2: Weakness in the platform’s security practices
Scenario 1 : The hotel chain’s reputation.
Scenario 2 : Weaknesses in the platform’s security practices.
White hat
Black hat
Gray hat
Black hat
Gray hat
Scenario 1: [3] The hotel chain’s reputation.
Scenario 2: [1] Weaknesses in the platform’s security practices.
Scenario 1
The hacker have access to the names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices
scenario 1
The card payment information of over three million guests.
The names, email address and phone numbers of over three million hotel guests.
The hotel chain’s reputation.
The username and password of all of the hotel’s employees.
Scenario 2
Weaknesses in the platform’s security practices.
Scenario 1: The hotel chain’s reputation
Scenario 2: Weaknesses in the platform’s security practices.
Scenero 1: the names,emails and phone numbers of over 3million hotel guests.
Scenero 2: this is due to weaknesses in the platform’s security practices.
1. Gray hat
2.Black hat
3.White hat
4.Gray hat
5. White hat
Scenario One
The names, email address and phone numbers of over three million hotel guests.
Scenario Two
Weaknesses in the platform’s security practices.
Scenario 1
The hotel chain’s reputation.
Scenario 2
Weaknesses in the platform’s security practices.
Scenario One
The names, email address and phone numbers of over three million hotel guests.
Scenario Two
Weaknesses in the platform’s security practices.
Scenario 1- The card payment information of over three million guests.
Scenario 2- Weaknesses in the platform’s security practices.
Scenario One,
The pII of the hotel customers which are over three milllion were stolen. That is, the name, email address, and phone number
Scenario 2.
This is due to weaknesses in the company security practices
Scenario 2,
Weaknesses in the platform’s security practices.
Scenario 1.
The hacker gain access through one of the staff and take information of guests of over 3millions such as Email, phone number, Full names…
Scenario 2.
The e-learning site expose their students to the cloud without security measure and authentication because they don’t have enough cloud storage and good Cyber security consultant.
Scenerio 1:
The card payment information of over three million guests.
The hotel chain’s reputation.
The username and password of all of the hotel’s employees.
The names, email address and phone numbers of over three million hotel guests.
Scenerio 2:
Weaknesses in the platform’s security practices.
Bypassing the platform’s access control methods.
Answer
1. The user name and password of all the employees
2. Weakness in the platform’s security practice
Scenario 2- Weaknesses in the platform’s security practices.
Scenario 1 -The names, email address and phone numbers of over three million hotel guests.
Scenario 1
They took the names, email address and phone numbers of over three million hotel guests.
Scenario 2
They exploited the weaknesses in the platform’s security practices.
Scenario 1: The names, email address and phone numbers of over three million hotel guests.
Scenario 2: Weaknesses in the platform’s security practices.
first one
The names, email address and phone numbers of over three million hotel guests
second
Weaknesses in the platform’s security practices
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices
First one
The names, email address and phone numbers of over three million hotel guests.
Second one Weaknesses in the platform’s security practices
a
1. Gray hat
2. Black hat
3. White hat
4. Gray hat
5. White hat
1)The names, email address and phone numbers of over three milloin hotel guests
2)Weaknesses in the platform’s security practices.
Scenario 1 -The names, email address and phone numbers of over three million hotel guests.
Scenario 2- Weaknesses in the platform’s security practices.
Scenario 1 -The names, email address and phone numbers of over three million hotel guests.
Scenario 2- Weaknesses in the platform’s security practices.
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weakness in the platform’s security practices.
Bypassing the platform’s access control methods.
Scenario 1 :
2. The names, email address and phone numbers of over three million hotel guests.
Scenario 2:
1. Weaknesses in the platform’s security practices.
Scenario 1:
2. The names, email address and phone numbers of over three million hotel guests.
Scenario 2:
1. Weaknesses in the platform’s security practices.
Scenario 1:
The Names, email addresses and phone numbers of over 3 million hotel guests.
Scenario 2:
Weakness in the platform’s security practices
Scenario 1 answer:
The names, email address and phone numbers of over three million hotel guests.
Scenario 2 answer:
Weakness in the platform’s security practices.
Scenario 1:
The card payment information of over three million guests.
The names, email address and phone numbers of over three million hotel guests.
The username and password of all of the hotel’s employees.
Scenario 2:
Weakness in the platform’s security practices.
Bypassing the platform’s access control methods.
Scenario one:
1.The card payment information of over three million guests.
2. The names, email address and phone numbers of over three million hotel guests.
3. The hotel chain’s reputation.
Scenario two:
1. Weaknesses in the platform’s security practices.
2. Extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer.
3. Bypassing the platform’s access control methods.
Scenario 1: The hotel chain’s reputation
Scenario 2:Weaknesses in the
platform’s security
Scenario 1 3. The hotel chain’s reputation.
Scenario 2 Weaknesses in the platform’s security practices.
scenario 1: The hotel chain’s reputation. The username and password of all of the hotel’s employees.
scenario 2: Weakness in the platform’s security practices. Bypassing the platform’s access control methods.
Scenario 1 -The names, email address and phone numbers of over three million hotel guests.
Scenario 2- Weaknesses in the platform’s security practices.
1.
The card payment information of over three million guests.
The names, email address and phone numbers of over three million hotel guests.
2.
Weaknesses in the platform’s security practices.
scenario 1 – 3, the hotels chain reputation
scenario 2 –1, weakness in the platform’s security practices
Scenario 1: The hotel chain’s reputation
Scenario 2: Weaknesses in the platform’s security practices.
Scenario 1: The hotel chain’s reputation
Scenario 2:Weaknesses in the
platform’s security
Scenario 1 :The names, email address and phone numbers of over three million hotel guest
Scenario 2: Weaknesses in the platform’s security practices
Scenario1
The card payment information of over three million guest
Scenario2
The weaknesses in the platform’s security practice
scenario 1 – 3 the names, phone number and email address of over three million hotel guest
scenario 2 – weakness in the platform’s security practices
Scenario 1.The names, email address and phone numbers of over three million hotel guests.
The hotel chain’s reputation.
Scenario 2: Weaknesses in the platform’s security practices.
Scenario 1:
The card payment information of over three million guests.
Scenario 2:Weaknesses in the platform’s security practices.
Scenario 1 :The names, email address and phone numbers of over three million hotel guest
Scenario 2: Weaknesses in the platform’s security practices
Scenario 1; 3- The hotel chain’s reputation
Scenario 2 : weakness in the platform ‘s security practices
Scenario 1 :The names, email address and phone numbers of over three million hotel guest
Scenario 2: Weaknesses in the platform’s security practices
Scenario 1: The harkers gained access to the names, email address and phone numbers of over three million hotel guests.
Scenario 2: The harkers exploited the weaknesses in the platform’s security practices.
Scenario 1 :The names, email address and phone numbers of over three million hotel guest
Scenario 2: Weaknesses in the platform’s security practices
The hotel chain reputation
Weaknesses in the platform security practices
1. The card payment information of over three million guests.
2. Weaknesses in the platform’s security practices.
Answers
Scenario 1: The names, email address and phone numbers of over three million hotel guests
Scenario 2: Weaknesses in the platform’s security practices
Scenario 1; 3- The hotel chain’s reputation
Scenario 2 : weakness in the platform ‘s security practices
Scenario 1
3. The hotel chain’s reputation
Scenario 2
1.Weakness in the platform’s security practices
Answers
Scenario 1: The names, email address and phone numbers of over three million hotel guests
Scenario 2: Weaknesses in the platform’s security practices
Scenario 1:The names, email address and phone numbers of over three million hotel guests.
Scenario 2:Taking advantage of student information not being correctly validated on the platform.
scenario one: The card payment information of over three million guests.
2: Weaknesses in the platform’s security practices
Scenario 1:
1. The names, email addresses, and phone numbers of over three million hotel guests.
2. Hotel chain reputation
Scenario 2
1. Weaknesses in the platform’s security practices
1. The names, email address and phone numbers of over three million hotel guests.
2. Weaknesses in the platform’s security practices.
1. The card payment information of over three million guests.
2. Weaknesses in the platform’s security practices.
Scenario 1
The card payment information of over three million guests
Scenario 2
Weaknesses in the platform’s security practices.
1. the names, email address and phone numbers of over three million hotel guests.
2. weaknesses in the platform’s security practices
1. The card payment information of over three million guests because the card information contained, the full name, address, phone number..
2. Weaknesses in the platform’s security practices.
1. The card payment information of over three million guests.
2. Weaknesses in the platform’s security practices.
Scenario 1
a) the card payment information of over three million guest
b)the names ,email addresses and phone numbers of over three million hotel guest
Scenario 2
a) weakness in the platform security practices
b)by passing the platform’s access control methods
Scenario 1 : The hotel chain’s reputation.
Scenario 2: Weaknesses in the platform’s security practices..
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
The hotel chain’s reputation.
Scenario 2
Weaknesses in the platform’s security practices.
Taking advantage of student information not being correctly validated on the platform.
scenario 1
The hotel chain’s reputation.
scenario 2
Weaknesses in the platform’s security practices.
Senerio 1 : The hotel chain’s reputation.
Senerio 2: Weakness in the platform’s security practices.
The names, email address and phone numbers of over three million hotel guests
Weaknesses in the platform’s security practices.
scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices.
Scenario 1
The card payment information of over three million guests.
Scenario 2
Weaknesses in the platform’s security practices.
Scenario 1:
The hackers took the names, email addresses and phone numbers of over three million hotel guests, also damaged the reputation of the hotel as prospective clients will belief their personal details are not safe with the hotel.
Scenario 2:
The exploits the hackers used are the weaknesses in the platform’s security practices, as well as extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer
Scenario 1
The hotel chain’s reputation.
Scenario 2
Weaknesses in the platform’s security practices.
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices.
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices.
Scenario 1
The card payment information of over three million guests.
Scenario 2
Weaknesses in the platform’s security practices
1. The card payments information of over three million guests
2. Weaknesses in the platform security practice
Scenario 1 : the hotel’s chains reputation
Scenario 2 : weakness in the platform security practices
Scenario 1
The hackers took the hotel’s chain reputation.
Scenario 2
Taking advantage of student information not being correctly validated on the platform.
The name email address and phone number of the over three million guest
Weakness in the platform security practices
1.Scenario 1The hackers took the names, email address and phone numbers of over three million hotel guests. And also the hotels chain reputation.
2. Scenario 2 , The hackers used the weaknesses in the platform’s security practices.
scenario 1: The harkers where able to access the names, email address and phone numbers of over three million hotel guests.
Scenario 2: Weaknesses in the platform’s security practices.
1. The hotel chain’s reputation has been stolen most importantly.
2. Weaknesses in the platform’s security practices.
Scenario 1:
The hackers took the names, email address and phone numbers of over three million hotel guests while also damaging the reputation of the hotel, as prospective clients will belief their personal detail is not safe with the hotel.
Scenario 2:
The exploits the hackers used are Weaknesses in the platform’s security practices, as well as Extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer.
1. Black hat
2.Gray hat
3. White hat
4. Gray hat
5. Gray hat
1. Weaknesses in the platform’s security practices.
2. Bypassing the platform’s access control methods.
3. Taking advantage of student information not being correctly validated on the platform.
1. The card payment information of over three million guests.
2. The names, email address and phone numbers of over three million hotel guests.
3. The username and password of all of the hotel’s employees.
Scenario 1:
The hackers took the names, email address and phone numbers of over three million hotel guests. They also damaged the reputation of the hotel, as prospective clients will be skeptical about how safe their personal detail is with the hotel.
Scenario 2:
The exploits the hackers used are Weaknesses in the platform’s security practices, as well as Extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer.
1. The names, email address and phone numbers of over three million hotel guests.
2. Weaknesses in the platform’s security practices.
1: The names, email addresses, and phone numbers of over three million hotel guests.
2: Taking advantage of student information not being correctly validated on the platform
1. The names, email address and phone numbers of over three million hotel guests
2. Weaknesses in the platform security
Scenario 1. The hotel chain’s reputation
Scenario 2. Weaknesses in the platform’s security practices.
In the first case scenario, the hackers took the names, emails, and other data of the hotel guests.
Second case scenario, the exploited the weakness of the school database security.
The names, email address and phone numbers of over three million hotel guests.
Weaknesses in the platform’s security practices.
Scenario 1
The Card payment information of over three Million guests.
Scenario 2
Weakness in the platform’s security practice.
1. The names, email address and phone numbers of over three million hotel guests.
2. Weaknesses in the platform’s security practices.
1. The names, email address and phone numbers of over three million hotel guests.
2.Weaknesses in the platform’s security practices.
Scenario 1
The hotel chain s reputation
Scenario 2
Weakness in the platforms security practices
scenario 1 – Hotels chain reputation
Scenario 2 – weaknesses in the platforms security practice
1. The names, email address and phone numbers of over three million hotel guests.
2. Weaknesses in the platform’s security practices.
Scenario 1: The names, email address and phone numbers of over three million hotel guests.
Scenario 2: Weakness in the platform security practices.
1 The names, email address and phone numbers of over three million hotel guests.
2 Weaknesses in the platform’s security practices.
Scenario 1
The card payment information of over three million guest
Scenario 2
Weakness in the platform’s security practices
1. The card payment information of over 3 million guests.
2. Weaknesses in the platform’s security practices.
Scenario 1
The hotel chain’s reputation.
Scenario 2
Weaknesses in the platform’s security practices.
scenario 1 ; Hotels chain reputation
Scenario 2; weaknesses in the platforms security practice
Scenario 1:
Ans: 2. The names, email address and phone numbers of over three million hotel guests.
Scenario 2:
Ans: Weaknesses in the platform’s security practices.
Scenerio 1 :
2. The name , email address and phone number of over three million hotel guests.
Scenerio 2: weakness in the platform’s security practice
Scenerio 1…..The hotels chain reputation
Scenerio 2…..Weakness in the platform’s security practices
scenerio 1: The names, email address and phone numbers of over three million hotel guests.
Scenerio 2: Weaknesses in the platform’s security practices.
Scenario 1: The names, email address and phone numbers of over three million hotel guests.
The hotel chain’s reputation.
Scenario 2: Weaknesses in the platform’s security practices.
Scenario 1: Hotel chain’s reputation.
Scenario 2: Weakness in the platforms security practices.
The username and password of all of the hotel’s employees
Weaknesses in the platform’s security practices
Scenerio 1…..The hotels chain reputation
Scenerio 2…..Weakness in the platform’s security practices
Scenario 1: The names, email address and phone numbers of over three million hotel guests.
The hotel chain’s reputation.
Scenario 2: Weaknesses in the platform’s security practices.
Scenerio 1: Hotel chains reputation.
Scenerio 2: Weakness in the platform’s security practices.
Good day Dexa and the Instructors team. The module 1 is quite an eye opener. However, I wasn’t able select answers and submit same in the Assignment section.
For Scenario 1.
The names, email address and phone numbers of over three million hotel guests.
The hotel chain’s reputation.
The username and password of all of the hotel’s employees.
For Scenario 2.
Weaknesses in the platform’s security practices.
Taking advantage of student information not being correctly validated on the platform.
Bypassing the platform’s access control methods.
Good day Dexa and the Instructors team. The module 1 is quite an eye opener. However, I wasn’t able select answers and submit same in the Assignment section.
Scenerio 1: Hotel chains reputation.
Scenerio 2: Weakness in the platform’s security practices.
1 The names, email address and phone numbers of over three million hotel guests.
2 Weaknesses in the platform’s security practices.
Scenario 1:
The hackers took the names, email address and phone numbers of over three million hotel guests.
Scenario 2:
Weaknesses in the platform’s security practices.
Scenario 1:The names, email address and phone numbers of over three million hotel guests.
Scenario 2: Weaknesses in the platform’s security practices.
Scenario 1: Hotel’s Chain reputation
Scenario 2: Weakness in the platform’s security
Scenario 2.Weaknesses in the platform’s security practices.
Scenario 1: The hackers were able to take the names email addresses and phone numbers of over three million hotel guests
Scenario 2: weaknesses in the platform security practices
In scenario 1:Hotel Chain Reputation, the personal details of the guests can be used for unauthorized operations.
In scenario 2: the hacker use weaknesses in platform’s security service
Scenario 1: The names, email address and phone numbers of over three million hotel guests and The hotel chain’s reputation.
Scenario 2: Weaknesses in the platform’s security practices and Taking advantage of student information not being correctly validated on the platform.
1. Hotel Chain Reputation, the guests’ personal details which can be used for unauthorized operations.
2. Weaknesses in the platform’s security practices.
Scenario 3. The hotel chain reputation.
Scenario 1. Weakness in platforms security practice
Scenario one : The names, email address and phone numbers of over three million hotel guests.
Scenario 2: Weaknesses in the platform’s security practices
Scenario1: The username and password of all of the hotel’s employees.
Scenario 2: Taking advantage of student information not being correctly validated on the platform.
1. Hotel Chain Reputation, the personal details of the guests which can be used for unauthorized operations.
2.Weaknesses in the platform’s security practices.
Scenerio 1. The hackers were able to take the names, email address and phone numbers of over three million hotel guests. Scenerio 2. Weaknesses in the platform’s security practices.
Scenario 1: The names, email address and phone numbers of over three million hotel guests.
Scenario 2: Weaknesses in the platform’s security practices.
Scenario 1: the names, email addresses and phone numbers of over 3 million hotel guests.
Scenario 2: Weakness in the platform’s security practices
Scenario 1: The names, email address and phone numbers of over three million hotel guests.
Scenario 2: Weaknesses in the platform’s security practices.
Scenario 1:
2. The name, email address, phone numbers of over 3 million hotel guests.
Scenario 2:
1. Weakness in the platform’s security practices.
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices.
Scenario 1: The names, email address and phone numbers of over three million hotel guests.
Scenario 2: Weaknesses in the platform’s security practices.
Scenario 1. The hotel chain reputation.
Scenario 2. Weakness in platforms security practice
Scenario 1: The hackers took the names, email address and phone numbers of over three million hotel guests.
Scenario 2: The hackers uses the weaknesses in the platform’s security practices.
SCENARIO 1: The hacker took names, email address and phone numbers of over three million hotel guests.
SCENARIO 2: The hacker used weaknesses in the platform’s security practices.
In scenarios such as this, Once hackers get access into the hotel all data and resources are been exposed already
Scenario 1: The hackers takes, The names, email addresses, phone numbers of over 3 million hotel guest
Scenario 2: Weaknesses in the platform’s security practices
1.The hotel chain’s reputation.
2.Weaknesses in the platform’s security practices.
1. Scenario 1 : The hotel chain reputation.
2. Scenario 2 : Weakness in platforms security practice
The names, email address and phone numbers of over three million hotel guests.
1. The hotel chain reputation.
2. Weakness in platforms security practice
Scenario 1:
The names, email addresses and phone numbers of over three million hotel guests.
Scenario 2:
Weaknesses in the platform’s security practices.
1. The names, email address and phone numbers of over three million hotel guests.
2.Extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer
Scenario 1 the answer is option 2.
Scenario 2 the answer is taking advantage of student information not being correctly validated on the platform.
Related
The names, email address and phone numbers of over three million hotel guests.
1. The names, email address and phone numbers of over three million hotel guests.
2. Weaknesses in the platform’s security practices.
first one was the names,email addresses,and phone numbers of over three million hotel guest
second part Weaknesses in the platform’s security practices
In the first Scenario, the names, email address and phone number of over three million hotel guests was taken. It is true that the reputation of the hotel has been affected, but on a larger scale, what appeals most to the attacker is the data of the guests he is able to get. What he is able to get doesnt just make the guest vulnerable, it also gives the attacker more options to carry our further attacks.
In the Second scenario, it was obvious that the platform had weak security practices which allowed the attacker to have access to so many details.
Scenario 1:
The names, email addresses and phone numbers of over three million hotel guests.
Scenario 2:
Weaknesses in the platform’s security practices.
Scenario one.
The name and email address ,phone number of over 3million hotel guest.
Scenario two:
Weakness in the platform security practise
Scenario 1:
The names, email address and phone numbers of over three million hotel guests.
Scenario 2:
Weaknesses in the platform’s security practices.
Weakness in the platform security’s practices.
Scenario one:
1. The card payment information of over three million guests.
2. The hotel chain’s reputation.
3. The names, email address and phone numbers of over three million hotel guests.
Scenario two:
1. Weaknesses in the platform’s security practices.
The hotel chain reputation
Scenario One : The hotel chain’s reputation.
Scenario Two : Weakness in the platform security practices .
Scenario 1: option 2
Scenario 2: option 1
The names, email address and phone numbers of over three million hotel guests.
Weaknesses in the platform’s security practices.
Scenario 1
The card payment information of over three million guests.
Scenario 2
Weaknesses in the platform’s security practices
Scenario One: The names, email address and phone numbers of over three million hotel guests.
Scenario Two: Weakness in the platform’s security practices.
The hotel chain’s reputation
Weaknesses in the platform’s security practices.
Scenario 1:
The names, email address and phone numbers of over three million hotel guests.
Scenario 2:
Weaknesses in the platform’s security practices.
The hotel chain’s reputation
(Scenerion 1)The names, email addresses, and phone numbers of over three million hotel guests.
(Scenario 2) Weaknesses in the platform’s security practices.
Scenario 1: The names, email address and phone numbers of over three million hotel guests.
Scenario 2: Weaknesses in the platform’s security practices.
(1)The names, email address and phone numbers of over three million hotel guests.
(2) Weaknesses in the platform’s security practices.
Scenario one
The names, email address and phone numbers of over three million hotel guests
scenario two
Weaknesses in the platform’s security practices.
Scenario 1
2.The names, email address and phone numbers of over three million hotel guests.
and
3. The hotel chain’s reputation.
Scenario 2
.Weaknesses in the platform’s security practices.
Scenario ONE: The names, email address and phone numbers of over three million hotel guests.
Scenario TWO: Weakness in the platform’s security practices.
scenario 1.
The names, email address and phone numbers of over three million hotel guests.
Scenario 2,
Weaknesses in the platform’s security practices.
Scenario 1
The names, email address and phone numbers of over three million hotel
Scenario 2
Weaknesses in the platform’s security practices.
The names, email address and phone numbers of over three million hotel guests.
Weaknesses in the platform’s security practices.
Scenario 2
Weaknesses in the platform’s security practices
The card payment information of over three million guests.
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices.
The names, email address and phone numbers of over three million hotel guests.
Weaknesses in the platform’s security practices.
The card payment information of over three million guests.
Weaknesses in the platform’s security practices.
Weaknesses in the platform’s security practices.
– The hotel’s chain reputation
– Weakness in platform’s security practices
Scenario 2
Weaknesses in the platform’s security practices.
Bypassing the platform’s access control methods.
The names, email addresses and phone numbers of over three million hotel guests.
1. The names, email address and phone numbers of over three million hotel guests.
2. Weaknesses in the platform’s security practices.
Scenario One: The hackers made away with the names, email addresses, and phone numbers of over three million hotel guests.
Scenario Two: The hackers could access the students’ information as a result of the weakness in the platform’s security practices. It’s not an ideal thing to have such valuable personal information exposed on a publicly accessible cloud database without security measures.
Scenario1: The names, email address and phone numbers of over three million hotel guests.
Scenario2: Weaknesses in the platform’s security practices.
1. In the first scenario the hackers made away with the names, email address and phone numbers of over three million hotel guests.
2. In the second scenario the hackers could access the students’ information as a result of the weakness in the platform’s security practices. It’s not an ideal thing to have such valuable personal information exposed on a publicly accessible cloud database without security measures.
Weaknesses in the platform’s security practices.
The hotel chain’s reputation
In the first scenario, the cybercriminals used the username and password of one of the employees to get the information.
while in the second scenario, I believe the hackers used the Weaknesses in the platform’s security practices. Because how will they explain leaving vital information of their students in a publicly accessible platform.
The names, email addresses, and phone numbers of over three million hotel guests.
Weaknesses in the platform’s security practices.
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices
-The username and password of all of the hotel’s employees.
-Weaknesses in the platform’s security practices.
Weaknesses in the platform’s security practice
The username and password of all of the hotel’s employees.
Weaknesses in the platform’s security practices.
Weaknesses in the platform’s security practices.
Bypassing the platform’s access control methods.
-The names, email address and phone numbers of over three million hotel guests.
– Weaknesses in the platform’s security practices.
Weaknesses in the platform’s security practices.
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices
scenario 1
The names, email address and phone numbers of over three million hotel guests.
scenario 2
Weaknesses in the platform’s security practices.
Scenario 1: The hotel chain’s reputation.
Scenario 2: Weaknesses in the platform’s security practices.
Scenario 1: The names, email address and phone numbers of over three million hotel guests.
Scenario 2: Weaknesses in the platform’s security practices.
Day 2
Answers to What Color is my hat?
1. Gray hat: Uknown agenda and unauthorised access
2. Black hat: Took advantage of customer account for financial gain
3. Gray hat: Undisclosed agenda. May or may not report vulnerabilities of the system to the owner
4. Black hat: Malicious agenda for financial gain
5. White hat: Authorised access by the owner
SCENARIO1:
The names, email address and phone numbers of over three million hotel guests
SCENARIO2:
Weaknesses in the platform’s security practices.