Scenario 1

Security breaches today are all too common, with attackers constantly finding new and innovative ways of infiltrating organizations in search of valuable information.

Scroll down to read the latest breaking security news headline.

What Happened?

According to our sources, a well known hotel chain that operates across the world has reported a massive data breach, with the personal information of over three million guests exposed to hackers.

The hotel discovered that hackers gained access to its customer database by using the login details of one of its employees.

At this point, the hotel doesn’t believe that the hackers were able to access any account passwords or financial information. Recent guests are encouraged to check the hotel chain’s web portal to see if they have been impacted by this breach.

*This is a fictional scenario.

This is a multiple choice question. Once you have selected an option, select the submit button below to submit your answer.

In this example, what did the hackers take?

Select the correct answer, then Submit.

  1. The card payment information of over three million guests.
  2. The names, email address and phone numbers of over three million hotel guests.
  3. The hotel chain’s reputation.
  4. The username and password of all of the hotel’s employees.

Scenario 2

eLearning Platforms at Risk!

The team at DEXA is concerned. eLearning platforms are becoming prime targets for attackers as more and more organizations make the move to digital learning.

SCROLL down to find out more about a recent case.*

A popular online training platform admitted leaving the personal data of millions of its students (many of them minors) exposed on a publicly accessible cloud database.

Hackers were able to directly access students’ full names, email addresses, phone numbers, and school enrollment details from the Internet!

While it’s unclear what the hackers have done with this acquired information, it’s safe to say that they have everything they need to carry out widespread phishing or malware attacks.

What Exploits?

What exploits did the hackers use in this case to gain access to valuable personal information?

Select the correct answer, then Submit.

  • Weaknesses in the platform’s security practices.
  • Extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer.
  • Bypassing the platform’s access control methods.
  • Taking advantage of student information not being correctly validated on the platform.

Leave a Reply

Your email address will not be published. Required fields are marked *

871 thoughts on “Discussion Assignment Cyber Security Course- What was Taken?

  1. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    The hotel chain’s reputation.
    Scenario 2
    Weaknesses in the platform’s security practices.

  2. Scenario 1.
    Ans. The names, email address and phone numbers of over three million hotel guests

    Scenario 2
    Ans. Weaknesses in the platform’s security practices.

  3. 1. The names, email address and phone numbers of over three million hotel guests
    2. Weaknesses in the platform’s security practices

  4. 1 The names,email address and phone numbers of over 3 million hotel guest.
    2 weaknesses in the platform’s security practices.

  5. Scenario 1

    The names, email address and phone numbers of over three million hotel guests

    Scenario 2

    Weaknesses in the platform’s security practices

  6. 1.The names, email address and phone numbers of over three million hotel guests.
    2.Weaknesses in the platform’s security practices.

  7. 1. The names, email addresses and phone numbers of over 3 million hotel guests
    2. weaknesses in the platform’s security practices

  8. 1. Weaknesses in the platform’s security practices.
    2. The names, email address and phone numbers of over three million hotel guests.

    1. WHITE HAT
    2. BLACK HAT
    3. WHITE HAT
    4. BLACK HAT
    5. GRAY HAT

  9. Scenario 1.
    The username and password of all of the hotel’s employees.
    Scenario 2.
    Weaknesses in the platform’s security practices.

  10. Scenario 1.
    The username and password of all of the hotel’s employees.

    Scenario 2.
    Weaknesses in the platform’s security practices.

  11. Scenario one;
    Answer: the names, email addresses and phone numbers of over three million hotel guests.

    Scenario two:
    Answer: weakness in the platform’s security practices.

  12. 1. The names, email address and phone numbers of over three million hotel guests.
    2.Weaknesses in the platform’s security practices.

  13. 1.the names, email address and phone numbers of over three million hotel guests.

    2. Weaknesses in the platform’s security practices.

  14. Scenaria 1: The names, email addresses, and phone numbers of over three million hotel guests.
    Scenario 2: Weaknesses in the platform’s security practices.

  15. Scenario 1: The names, email address and phone numbers of over three million hotel guests.

    Scenario 2: Weaknesses in the platform’s security practices.

  16. 1. The names, email address and phone numbers of over three million hotel guests.
    2. Weaknesses in the platform’s security practices.

  17. Scenario 1
    – The names, email address and phone numbers of over three million hotel guests.
    – The hotel chain reputation
    Scenario 2
    Weaknesses in the platform’s security practices.

  18. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.
    Scenario 2
    Weaknesses in the platform’s security practices.

  19. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.
    Scenario 2
    Weaknesses in the platform’s security practices.

  20. Scenario 1:

    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2:
    Weaknesses in the platform’s security practices.

  21. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.
    Scenario 2
    Weaknesses in the platform’s security practices.

  22. Scenario 1

    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platform’s security practices.

  23. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.
    Scenario 2
    Weaknesses in the platform’s security practices

  24. Scenario 1
    * The names, email address and phone numbers of over three million hotel guests.
    Scenario 2
    * Weaknesses in the platform’s security practices.

  25. Scenario 1 The card payment information of over three million guests.

    Scenario 2 Weaknesses in the platform’s security practices.

  26. Scenario 1 The card payment information of over three million guests.
    Scenario 2 Weaknesses in the platform’s security practices.

  27. 1. The names, email address and phone numbers of over three million hotel guests
    2.Weaknesses in the platform’s security practices.

  28. Scenario 1: The names, email address and phone numbers of over three million hotel guests

    Scenario 2: Weaknesses in the platform’s security practices.

  29. Scenario 1 : The Names, Email address, and Phone Numbers of over three million hotel guests.

    Scenario 2 : Weakness in the platform security practices.

  30. SCENARIO 1
    The names, email addresses, and phone numbers of over three million hotel guests.

    SCENARIO 2
    Weaknesses in the platform’s security practices.

  31. FIRST SCENARIO
    : The names, email addresses, and phone numbers of over three million hotel guests.

    SECOND SCENARIO
    : Weaknesses in the platform’s security practices.

  32. Scenario 1
    * The names, email address and phone numbers of over three million hotel guests.
    Scenario 2
    * Weaknesses in the platform’s security practices.

  33. Scenario 1
    *The names, email address and phone numbers of over three million hotel guests.
    *The hotel chain’s reputation.
    scenario 2
    *Weaknesses in the platform’s security practices.

  34. The names, email address and phone numbers of over three million hotel guests.
    Weaknesses in the platform’s security practices.

  35. Scenario 1
    *The names, email address and phone numbers of over three million hotel guests.
    *The hotel chain’s reputation.
    scenario 2
    *Weaknesses in the platform’s security practices.

  36. The names, email address and phone numbers of over three million hotel guests.

    Extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer.

  37. scenario 1
    *The names, email address and phone numbers of over three million hotel guests.
    *The hotel chain’s reputation.

    scenario 2
    *Weaknesses in the platform’s security practices.

  38. the use of Chat GPT to create questions for engagement surveys, analyze and also the implementations of AI assistant could even support more ‘proactive’ aspects of HR and allow HR teams to make a real difference to the culture of an organization. But i believe that this will make HRM work more artificial and also reduce manpower

  39. The card payment information of over three million guests.

    Taking advantage of student information not being correctly validated on the platform.

  40. Scenerio 1: The names, email address and phone numbers of over three million hotel guests.

    Scenerio 2: Weaknesses in the platform’s security practices.

  41. Scenerio 1: The card payment information of over three million guests.

    Scenerio 2: Weaknesses in the platform’s security practices.

  42. SCENARIO 1:
    The card payment information of over three million guests.

    The names, email address and phone numbers of over three million hotel guests.

    The hotel chain’s reputation.

    SCENARIO 2:
    Weaknesses in the platform’s security practices.
    Extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer.
    Bypassing the platform’s access control methods.

  43. SCENARIO 1: The names, email address and phone numbers of over three million hotel guests.

    SCENARIO 2: Weaknesses in the platform’s security practices.

  44. SCENARIO 1: The names, email address and phone numbers of over three million hotel guests.

    SCENARIO 2: Weaknesses in the platform’s security practices.

  45. SCENARIO 1: The names, email address and phone numbers of over three million hotel guests.

    SCENARIO 2: Weaknesses in the platform’s security practices.

  46. 1. “Mmm… I’m not sure we’re allowed to use the private Wi-Fi network. Let me check with my manager first.”

  47. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.
    The hotel chain’s reputation.

    Scenario 2
    Weaknesses in the platform’s security practices.
    Taking advantage of student information not being correctly validated on the platform.

  48. Scenario 1:
    The names, email address and phone numbers of over three million hotel guests.
    Scenario 2:
    Weaknesses in the platform’s security practices.

  49. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.
    Scenario 2
    Weaknesses in the platform’s security practices.

  50. Scenario 1: The names, email address and phone numbers of over three million hotel guests.

    Scenario 2:
    Weaknesses in the platform’s security practices.

  51. Select the correct answer from the options and submit in the learning group.

    1. After hacking into ATM systems remotely using a laptop, this attacker worked with the ATM manufacturers to resolve the identified security vulnerabilities.

    Please select an option
    ° Gray hat

    2. This attacker transferred $10 million into their bank account using customer account and PIN credentials gathered from recordings.

    Please select an option
    ° Black hat

    3. This attacker’s job is to identify weaknesses in a company’s computer system.
    Please select an option
    ° White hat

    4. This attacker used malware to compromise a company’s system and steal credit card information that was then sold to the highest bidder.
    Please select an option
    ° Gray hat

    5. While carrying out some research, this attacker stumbled across a security vulnerability on an organization’s network that they are authorized to access.
    Please select an option
    ° White hat

  52. 2. The names, email address and phone numbers of over three million hotel guests.

    1. Weaknesses in the platform’s security practices.

  53. Scenario 1: The names, email address and phone numbers of over three million hotel guests.

    Scenario 2. The username and password of all of the hotel’s employees

  54. In the first scenario, the cyber-criminals used the username and password of one of the employees to get the information.
    while in the second scenario, I believe the hackers used the Weaknesses in the platform’s security practices. Because how will they explain leaving vital information of their students in a publicly accessible platform.

  55. 1. Case 1:The names, email address and phone numbers of over three million hotel guests.

    2. Case 2:Weaknesses in the platform’s security practices.

  56. Hotel scenario: The names, email address and phone numbers of over three million hotel guests.

    Student case scenario: Weaknesses in the platform’s security practices.

  57. Scenario 1
    The names, email address and phone numbers of over three million hotel guests

    Scenario 2
    Weaknesses in the platform’s security practices.

  58. Scenario 1

    The card payment information of over three million guests.

    Scenario 2
    Taking advantage of student information not being correctly validated on the platform.

  59. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.
    Scenario 2
    Weaknesses in the platform’s security practices.

  60. Scenario 1: The username and password of all of the hotel’s employees.
    Scenario 2: Weaknesses in the platform’s security practices.

  61. 1:
    The names, email address and phone numbers of over three million hotel guests.

    2:
    Weaknesses in the platform’s security practices.

  62. Scenario 1:
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2:
    Weaknesses in the platform’s security practices.

  63. scenario 1;i.The username and password of all of the hotel’s employees.
    iiThe username and password of all of the hotel’s employees.
    scenario 2; Weaknesses in the platform’s security practices.

    1. Scenario 1
      The names, email address and phone numbers of over three million hotel guests.

      Scenario 2
      Weaknesses in the platform’s security practices.

  64. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platform’s security practices.

  65. 1. The names, email address and phone numbers of over three million hotel guests.

    2. Weaknesses in the platform’s security practices.

  66. Q1: The names, email address and phone numbers of over three million hotel guests
    Q2: Weaknesses in the platform’s security practices

  67. 1 The username and password of all of the hotel’s employees.

    2. Weaknesses in the platform’s security practices.

  68. Q1. The names, email address and phone numbers of over three million hotel guests.
    Q2. Weaknesses in the platform’s security practices.

  69. Answer to question 1; The username and password of all of the hotel’s employees.
    Answer to question 2; Weaknesses in the platform’s security practices.

  70. Q1. The names, email address and phone numbers of over three million hotel guests.

    Q2. Weakness in the platform’s security practice.

  71. 1. The names, email address and phone numbers of over three million hotel guests.
    2. Weaknesses in the platform’s security practices.

  72. Q1. The username and password of all of the hotel’s employees.

    Q2. Weaknesses in the platform’s security practices.

  73. The names, email address and phone numbers of over three million hotel guests.
    Weaknesses in the platform’s security practices.

  74. Scenario 1
    The names,email address and phone numbers of over three million hotel guests .
    Scenario 2
    Weaknesses in the platform security practices.

  75. 1. The names, email address and phone numbers of over three million hotel guests.

    2. Weaknesses in the platform’s security practices.

  76. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platform’s security practices.

  77. 1. The names, email address and phone numbers of over three million hotel guests.

    2. Weaknesses in the platform’s security practices.

  78. Scenario 1: The names, email address and phone numbers of over three million hotel guests.

    Scenario 2: Weaknesses in the platform’s security practices.

  79. Scenario 1: Answer – 2. The names, email address and phone numbers of over three million hotel guests.

    Scenario 2: Answer – 1. Weaknesses in the platform’s security practices.

  80. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platform’s security practices

  81. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.
    Scenario 2
    Weaknesses in the platform’s security practices

  82. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platform’s security practices.

  83. Senario 1
    The names, email address and phone numbers of over three million hotel guests.

    Senario 2
    Weaknesses in the platform’s security practices.

  84. Scenario 1
    The username and password of all of the hotel’s employees.
    Scenario 2
    Weaknesses in the platform’s security practices.

  85. Scenario 1 – The names, email address and phone numbers of over three million hotel guests.

    Scenario 2 – Weaknesses in the platform’s security practices.

  86. Scenario 1:
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2:
    Weaknesses in the platform’s security practices

  87. Scenario 1:
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2:
    Weaknesses in the platform’s security practices.

  88. Scenario 1.

    The card payment information of over three million guests.
    The names, email address and phone numbers of over three million hotel guests.
    The hotel chain’s reputation.

    Scenario 2.

    Weaknesses in the platform’s security practices.
    Bypassing the platform’s access control methods.

  89. Scenerio 1
    The names, email address and phone numbers of over three million hotel guests.
    Scenario 2
    Weaknesses in the platform’s security practices.

  90. Scenario 1

    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2

    Weaknesses in the platform’s security practices.

  91. Scenario 1;
    Answer: The hotel chain’s reputation

    Scenario 2;
    Answer: Weaknesses in the platform’s security practices.

  92. Scenario 1
    answer: The hotel chain’s reputation

    Scenario 2
    Answer: Weaknesses in the platform’s security practices

  93. The names, email address and phone numbers of over three million hotel guests.

    Weaknesses in the platform’s security practices.

  94. The names, email address and phone numbers of over three million hotel guests.

    Weaknesses in the platform’s security practices.

  95. first scenario

    The card payment information of over three million guests.
    The names, email address, and phone numbers of over three million hotel guests.
    The hotel chain’s reputation.
    The username and password of all of the hotel’s employees.

    Second scenario

    Weaknesses in the platform’s security practices.
    Extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer.
    Bypassing the platform’s access control methods.

  96. The card payment information of over three million guests

    The names, email address and phone numbers of over three million hotel guests.

    The username and password of all of the hotel’s employees.

    Weaknesses in the platform’s security practices

  97. Scenario1
    The name,email address and phone numbers of over three million hotel guests.

    Scenario2
    Weaknesses in the platform security practices

  98. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platform’s
    security practices.

  99. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2

    Weaknesses in the platform’s security practices.

  100. The names, email address and phone numbers of over three million hotel guests.

    Weaknesses in the platform’s security practices.

  101. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.
    The card payment information of over three million guests.
    Scenario 2
    Weaknesses in the platform’s security practices.

  102. Scenario 1
    * The names, email address and phone numbers of over three million hotel guests.
    Scenario 2
    * Bypassing the platform’s access control methods.

  103. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platform’s security practices.

  104. Assignment for Day 1

    Scenario 1: The names, email address and phone numbers of over three million hotel guests.

    Scenario 2: Weaknesses in the platform’s security practices

  105. Scenario 1

    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2

    Weaknesses in the platform’s security practices.

  106. Scenario 1:
    – The names, email address and phone numbers of over three million hotel guests.

    – The hotel chain’s reputation

    Scenario 2:
    Weaknesses in the platform’s security practices

  107. Scenario 1

    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2

    Weaknesses in the platform’s security practices.

  108. DAY 1 Assignment

    Day 1- The names, email address and phone numbers of over three million hotel guests

    SCENARIO 2-Weakness in the platform’s security practices.

  109. Scenario 1 The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platform’s security practices.

  110. The names, email address and phone numbers of over three million hotel guests.
    Weaknesses in the platform’s security practices.

  111. scenario 1
    The hotel chain’s reputation.
    scenario 2
    Weaknesses in the platform’s security practices

  112. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platform’s security practices.

  113. Scenario 1: The names, email address and phone numbers of over three million hotel guests.
    Scenario 2: Weaknesses in the platform’s security practices.

  114. Scenario 1: The username and password of all of the hotel’s employees.
    Scenario 2: Taking advantage of student information not being correctly validated on the platform.

  115. Scenario 1:
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2:
    Extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer.

  116. Scenario 1
    1. The card payment information of over three million guests.

    Scenario 2
    Weaknesses in the platform’s security practices.

  117. 1. The names, email address and phone numbers of over three million hotel guests.
    2. Weaknesses in the platform’s security practices.
    3.

  118. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.
    Scenario 2
    Weaknesses in the platform’s security practices.

  119. Extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer.

  120. The names, email address and phone numbers of over three million hotel guests
    Weaknesses in the platform’s security practices.

  121. SCENARIO 1
    The names, email address and phone numbers of over three million hotel guests.

    SCENARIO 2
    Bypassing the platform’s access control methods.

  122. The names, email address and phone numbers of over three million hotel guests.

    Weaknesses in the platform’s security practices.

  123. Case1
    The names, email address and phone numbers of over three million hotel guests.

    Case2
    Weaknesses in the platform’s security practices.

  124. The names, email address and phone numbers of over three million hotel guests.

    Weaknesses in the platform’s security practices.

  125. 1. The names, email address and phone numbers of over three million hotel guests.

    2. Weaknesses in the platform’s security practices.

  126. CASE 1:
    The names, email address and phone numbers of over three million hotel guests.

    CASE 2:
    Taking advantage of student information not being correctly validated on the platform.

  127. 1. The names, email address and phone numbers of over three million hotel guests.

    2. Weaknesses in the platform’s security practices.

  128. 1. The names, email address and phone numbers of over three million hotel guests.

    2. Weaknesses in the platform’s security practices.

  129. CASE 2: Weaknesses in the platform’s security practices.
    CASE 1: The card payment information of over three million guests.
    The names, email address and phone numbers of over three million hotel guests.
    The hotel chain’s reputation.

  130. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.
    Scenario 2
    Weaknesses in the platform’s security practices

  131. 1.The names, email address and phone numbers of over three million hotel guests.

    2.weaknesses in the platforms security practices.

  132. SCENARIO 1
    * The hotel’s chain reputation
    * The username and password of all of the hotel’s employees
    SCENARIO 2
    * Weaknesses in the platform’s security practices.
    * Bypassing the platform’s access control methods.

  133. Case 1
    The names, email address and phone numbers of over three million hotel guests.
    Case 2
    Weaknesses in the platform’s security practices.

  134. CASE1;
    The username and password of all of the hotel’s employees.
    CASE2:
    Weaknesses in the platform’s security practices.

  135. 1. The names, email address and phone numbers of over three million hotel guests.

    2.Weaknesses in the platform’s security practices.

  136. The names, email address and phone numbers of over three million hotel guests.

    Weaknesses in the platform’s security practices.

  137. Scenario 1:
    – The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    – Weaknesses in the platform’s security practices.

  138. The card payment information of over three million guests.

    The names, email address and phone numbers of over three million hotel guests.

    The hotel chain’s reputation.

  139. 1. The names, email address and phone numbers of over three million hotel guests.
    2. Weaknesses in the platform’s security practices.

  140. Scenerio 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2:
    Weaknesses in the platform’s security practices.

  141. Scenario 1. The card payment information of over three million guests.

    Scenario 2. Weaknesses in the platform’s security practices.

  142. 1. The names, email address, and phone numbers of over three million hotel guests.
    2. Weaknesses in the platform’s security practices.

  143. Scenario 1. The hotel chain’s reputation was taken.
    Scenario 2. Weaknesses in the platform’s security practices.

  144. Scenario 1: The username and password of all of the hotel’s employees.
    Scenario 2: Weaknesses in the platform’s security practices.

  145. Scenario 1. The hotel chain’s reputation was taken.
    Scenario 2. Weaknesses in the platform’s security practices.

  146. SCENARIO 1
    The names, email address and phone numbers of over three million hotel guests.

    The hotel chain’s reputation.

    SCENARIO 2
    Weaknesses in the platform’s security
    practices.

    Bypassing the platform’s access control methods.

  147. Scenario 1

    The username and password of all of the hotel’s employees.
    The names, email addresses and phone numbers of over three million hotel guests.
    The card payment information of over three million guests.

    Scenario 2

    The card payment information of over three million guests.

  148. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.
    The hotel chain’s reputation.

    Scenario 2
    Weaknesses in the platform’s security practices

  149. Scenario 1

    The names, email address and phone numbers of over three million hotel guests

    Scenario 2

    Weaknesses in the platform’s security practices

  150. Weaknesses in the platform’s security practices.

    The names, email address and phone numbers of over three million hotel guests.

  151. Scenario 1

    The names, email addresses, and phone numbers of over three million hotel guests.

    Scenario 2

    Weaknesses in the platform’s security practices

  152. 1. The names, email address and phone numbers of over three million hotel guests.

    2. Weaknesses in the platform’s security practices

  153. Scenario 1
    The names, email address and phone numbers of over three million hotel guests

    Scenario 2
    Weaknesses in the platform’s security practices.

  154. Question 1

    The names, email address and phone numbers of over three million hotel guests.

    Question 2

    Weaknesses in the platform’s security practices.

  155. Scenario 1

    The names, email addresses, and phone numbers of over three million hotel guests.

    Scenario 2

    Weaknesses in the platform’s security practices

  156. Scenario 1

    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platform’s security practices

  157. Scenario 1:

    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2:
    Weaknesses in the platform’s security practices.

  158. The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platform’s security practices

  159. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platform’s security practices.

  160. Scenario 1

    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platform’s security practices

  161. Scenario 1

    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platform’s security practices

  162. Scenerio 1: The names, email address and phone numbers of over three million hotel guests.

    Scenerio 2: Weaknesses in the platform’s security practices.

  163. Scenario 1.
    The names, email address and phone numbers of over three million hotel guests.
    Scenario 2. Weaknesses in the platform’s security practices.

  164. Scenario 1

    The names, email address and phone numbers of over three million hotel guests.
    The hotel chain’s reputation

    Scenario 2
    Weaknesses in the platform’s security practices.

  165. Scenario 1. The names, email address and phone numbers of over a million hotel guests
    Scenario 2. Extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer.

  166. Scenario 1 The names, email address and phone numbers of over three million hotel guests.
    Scenario 2 Weaknesses in the platform’s security practices.

  167. The names, email address and phone numbers of over three million hotel guests
    Weaknesses in the platform’s security practices.

  168. Scenario 1: The names, email address and phone numbers of over three million hotel guests.

    The hotel chain’s reputation.
    Scenario2: Weaknesses in the platform’s security practices

  169. Scenario 1: The names, email address and phone numbers of over three million hotel guests

    Scenario 2: Weaknesses in the platform’s security practices.

  170. Scenario one: The names, email address and phone numbers of over three million hotel guests.
    2.Weaknesses in the platform’s security practices.

  171. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platform’s security practices.

  172. Scenario 1……The names, email address and phone numbers of over three million hotel guests

    Scenario 2……….×Weaknesses in the platform’s security practices.

  173. 2.The names, email address and phone numbers of over three million hotel guests

    ×Weaknesses in the platform’s security practices.

  174. Scenario 1
    The username and password of all of the hotel’s employees.
    scenario 2
    Weaknesses in the platform’s security practices.

  175. Scenario 1 – The names, email address and phone numbers of over three million hotel guests

    Scenario 2 – Weakness in the platform’s security practices

  176. The names, email address and phone numbers of over three million hotel guests

    Weaknesses in the platform’s security practices.

  177. 1. The names, email address and phone numbers of over three million hotel guests.

    2. Weaknesses in the platform’s security practices.

  178. The names, email address and phone numbers of over three million hotel guests.

    Weaknesses in the platform’s security practices.

  179. scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platform’s security practices.

  180. 1. White Hat Attakers
    2. Black hat Attackers
    3. White hat Attackers
    4. Gray hat Attackers
    5. white hat attackers

  181. 1. The card payment information of over three million guests.

    Scenario 2
    Weaknesses in the platform’s security practices.

  182. 1
    The names, email address and phone numbers of over three million hotel guests.

    2
    1.White Hat
    2. Black Hat
    3. White Hat
    4. Grey Hat
    5. Black Hat

  183. The names, email address and phone numbers of over three million hotel guests.

    The names, email address and phone numbers of over three million hotel guests.

  184. Scenario1.The card payment information of over three million guests.

    Scenario 2. Weaknesses in the platform’s security practices.

  185. Scenario 1:The card payment information of over three million guests.

    Scenario 2:Weaknesses in the platform’s security practices.

  186. Scenario 1. The names, email address and phone numbers of over three million hotel guests.

    Scenario 2. Weaknesses in the platform’s security practices.

  187. Okeleji Testimony
    Day 1

    Scenario 1:
    The card payment information of over three million guests.

    Scenario 2:
    Weaknesses in the platform’s security practices.

  188. The names, email address and phone numbers of over three million hotel guests.
    Weaknesses in the platform’s security practices.

  189. Scenario 1:The names, email address and phone numbers of over three million hotel guests.
    Scenario 2:Weaknesses in the platform’s security practices.

  190. Scenario 1: The names, email address and phone numbers of over three million hotel guests.
    Scenario 2: Weaknesses in the platform’s security practices.

  191. Scenario 1
    The names, email address and phone numbers of over three million hotel guests

    Scenario 2
    Weaknesses in the platform’s security practices.

  192. Scenario 1: The names, email address and phone numbers of over three million hotel guests.
    Scenario 2: Weaknesses in the platform’s security practices.

  193. SCENARIO 1
    The names, email address and phone numbers of over three million hotel guests

    SCENARIO 2
    Taking advantage of student information not being correctly validated on the platform.

  194. The names, email address and phone numbers of over three million hotel guests

    Weaknesses in the platform’s security practices.

  195. The username and password of all of the hotel’s employees.

    Taking advantage of student information not being correctly validated on the platform.

  196. The names, email address and phone numbers of over three million hotel guests.

    Weaknesses in the platform’s security practices.

  197. Extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer.

  198. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.
    Scenario 2
    Weaknesses in the platform’s security practices.

  199. 1. The names, email address and phone numbers of over three million hotel guests.

    2. Weaknesses in the platform’s security practices.

  200. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.
    Scenario 2
    Bypassing the platform’s access control methods.

  201. Scenario 1

    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platform’s security practices.

  202. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platform’s security practices.

  203. Scenario 1.
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2.
    Weaknesses in the platform’s security practices.

  204. Scenario 1;

    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2;

    Weaknesses in the platform’s security practices.

  205. Scenario 1:
    The names, email address and phone numbers of over three million hotel guests.
    Scenario 2:
    Bypassing the platform’s access control methods.

  206. Scenario 1;

    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2;

    Weaknesses in the platform’s security practices.

  207. Scenario 2
    Weaknesses in the platform’s security practices.
    Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

  208. Scenario 1

    The card payment information of over three million guests.

    Scenario 2
    Taking advantage of student information not being correctly validated on the platform.
     

  209. The names, email address and phone numbers of over three million hotel guests.

    The hotel chain’s reputation.

    The username and password of all of the hotel’s employees.

  210. The names, email address and phone numbers of over three million hotel guests.

    The hotel chain’s reputation.

    The username and password of all of the hotel’s employees.

  211. 1. The names, email address and phone numbers of over three million hotel guests

    2. Weaknesses in the platform’s security practices

  212. #1. The names, email address and phone numbers of over three million hotel guests

    #2. Weaknesses in the platform’s security practices

  213. 1: Weaknesses in the platform’s security practices.
    2: The username and password of all of the hotel’s employees.

  214. Scenario 1;

    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2;

    Weaknesses in the platform’s security practices.

  215. scenario 1
    The names, email address and phone numbers of over three million hotel guests
    The hotel chain’s reputation.
    scenario 2
    Weaknesses in the platform’s security practices

  216. Scenario 1 :The names, email address and phone numbers of over three million hotel guests.
    Scenario 2:Weaknesses in the platform’s security practices.

  217. Scenario 1: The card payment information of over three million guests.

    Scenario 2: Weaknesses in the platform’s security practices.

  218. 1. The names, email address and phone numbers of over three million hotel guests.

    2. Weaknesses in the platform’s security practices.

  219. scenario 1
    The names, email address and phone numbers of over three million hotel guests
    scenario 2
    Weaknesses in the platform’s security practices

    1. Scenario 1
      The card payment information of over three million guests.
      The names, email address and phone numbers of over three million hotel guests.
      The hotel chain’s reputation.
      The username and password of all of the hotel’s employees.

      Scenario 2
      Weaknesses in the platform’s security practices.

  220. Scenerio 1 it is unclear what the hackers took but only one thing is clearly taken
    The hotel chain’s reputation.

    Scenerio 2
    Weaknesses in the platform’s security practices.

  221. Scenario 1
    The card payment information of over three million guests.

    Scenario 2
    Weaknesses in the platform’s security practices.

  222. Scenario 1

    The names, email address and phone numbers of over three million hotel guests.

    Scenario 3
    Weaknesses in the platform’s security practices.

  223. Scenario 1
    The names, email address and phone numbers of over three million hotel guests

    Scenario2
    Weakness in the platform’s security practices

  224. 1. The names, email address and phone numbers of over three million hotel guests.

    2. Weaknesses in the platform’s security practices.

  225. Scenario 2

    Bypassing the platform’s access control methods.

    Extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer.

    Weaknesses in the platform’s security practices.

  226. Scenario 1
    The card payment information of over three million guests.

    The username and password of all of the hotel’s employees.

    The names, email address and phone numbers of over three million hotel guests.

  227. Scenario 1
    The names, email address and phone numbers of over three million hotel guests

    Scenario2
    Weakness in the platform’s security practices

  228. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platform’s security practices.

  229. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platform’s security practices.

  230. Day 1, Excercise 6, Ans:-
    1a. The card payment information of over three million guests.

    2a. Weaknesses in the platform’s security.
    2b. Bypassing the platform’s access control methods.

  231. Scenario 1: The names, email address and phone numbers of over three million hotel guests.

    Scenario 2: Weaknesses in the platform’s security practices.

  232. The names, email address and phone numbers of over three million hotel guests.
    Weaknesses in the platform’s security practices.

  233. Scenario 1:
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2:
    Weaknesses in the platform’s security practices.

  234. Question 1: The names, email address and phone numbers of over three million hotel guests.

    Question 2: Weaknesses in the platform’s security practices.

  235. Day One Assignment:
    Scenario 1: The hotel chain’s reputation
    Scenario 2:Weaknesses in the platform’s security protection

    Day 2
    1. Gray Hat
    2. Black Hat
    3. White Hat
    4. Black Hat
    5. White hat

  236. Scenario 1: The names,email address and phone numbers of over three million hotel guests.

    Scenario 2: Weakness in the platform’s security practices.

  237. Day 2 answer: what’s the color of my hat?
    question 1 – White hat
    question 2 – Black hat
    question 3 – White hat
    question 4 – grey hat
    question 5 – White hat

  238. Scenario 1: The names,email address and phone numbers of over three million hotel guests.

    Scenario 2: Weakness in the platform’s security practices.

  239. Scenario 1: The names, email address and phone numbers of over three million hotel guests.
    Scenario 2: Weaknesses in the platform’s security practices.

  240. Scenario one;
    2. The names, email address and phone numbers of over three million hotel guests.

    Scenario two;
    * Weaknesses in the platform’s security practices.

  241. Scenario 1
    •The card payment information of over three million guests.
    •The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    •Bypassing the platform’s access control methods.

  242. Scenerio 1 – The names, email address and phone numbers of over three million hotel guests.
    Scenerio 2 – Weeknesses in the platform’s security practices

  243. Senerio 1
    The card payment information of over three million guests.

    Senerio 2
    Weaknesses in the platform’s security practices.

  244. Scenario 1- The card payment information of over three million guests.

    Scenario 2- Bypassing the platform’s access control methods.

  245. Scenario one;
    The names, email address and phone numbers of over three million hotel guests.

    Scenario two;
    Weaknesses in the platform’s security practices.

  246. 1. The names, email address and phone numbers of over three million hotel guests.
    2. Weaknesses in the platform’s security practices.

  247. Scenario 1: The card payment information of over three million guests.
    Scenario 2; Weaknesses in the platform’s security practices.

    1. White hat
    2. Black hat
    3. Gray hat
    4. Black hat
    5.Gray hat

  248. 1. The names, email address and phone numbers of over three million hotel guests.
    2.Weaknesses in the platform’s security practices.

  249. Scenario 1-The names, email address and phone numbers of over three million hotel guests
    Scenario 2-Bypassing the platform’s access control methods.

  250. scenario 1: The username and password of all of the hotel’s employees.

    scenario 2: Taking advantage of student information not being correctly validated on the platform.

  251. ——-The username and password of all of the hotel’s employees.

    ——— Weaknesses in the platform’s security practices.

  252. 1. The names, email address and phone numbers of over three million hotel guests.
    2.Weaknesses in the platform’s security practices.

  253. The names, email address and phone numbers of over three million hotel guests.

    Weaknesses in the platform’s security practices.

  254. The card payment information of over three million guests.
    The names, email address and phone numbers of over three million hotel guests.
    Weaknesses in the platform’s security practices.

  255. The names, email address and phone numbers of over three million hotel guests.
    Weaknesses in the platform’s security practices.

  256. The names, email address and phone numbers of over three million hotel guests.

    Weaknesses in the platform’s security practices.

    White Hat
    Black Hat
    White Hat
    Grey Hat
    White Hat

  257. The card payment information of over three million guests.
    The names, email address and phone numbers of over three million hotel guests.
    Weaknesses in the platform’s security practices.

  258. 1. The names, email address and phone numbers of over three million hotel guests.
    2. Weaknesses in the platform’s security practices.

  259. The names, email address and phone numbers of over three million hotel guests.
    Weaknesses in the platform’s security practices.

  260. Scenario 1: The names, email address and phone numbers of over three million hotel guests
    Scenario 2: Bypassing the platform’s access control methods, Weaknesses in the platform’s security practices.

    1. Scenario 1: The names, email address and phone numbers of over three million hotel guests.

      Scenario 2: Bypassing the platform’s access control methods, Weaknesses in the platform’s security practices

      1. White hat
      2. Black hat
      3. White hat
      4. Black hat
      5. Gray hat

  261. Cyber security: Day 2 Assignment

    Scenario 1:

    The hotel chain’s reputation.

    Scenario 2:

    Weaknesses in the platform’s security practices.

    1: Gray Hat
    2: Black Hat
    3: White Hat
    4: Black Hat
    5: White Hat

  262. Scenario 1: The hotel chain’s reputation.

    Scenario 2:Taking advantage of student information not being correctly validated on the platform.

  263. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Senario 2
    Weaknesses in the platform’s security practices.

  264. Scenario 1
    1. The card payment information of over three million guests.
    Senario 2
    Weaknesses in the platform’s security practices.

  265. Scenario 1
    1. The card payment information of over three million guests.
    Senario 2
    Weaknesses in the platform’s security practices.

  266. Scenario 1
    1. The names, email address and phone number of over 3 million hotel guests.

    Scenario 2
    2. Weakness in the platforms security practices

  267. Scenario 1: The username and password of all of the hotel’s employees.
    Scenario 2: Weaknesses in the platform’s security practices

  268. Weaknesses in the platform’s security practices was exploited by the hackers in obtaining important student information in the second scenario.

  269. Scenario 1.The hotel chain’s reputation

    Scenario 2.Extracting information when the volume of student data exceeds the storage

    1. Scenario 1: The employee username and password as well as the names, email address of the customers were taken

  270. scenario 1
    The names, email address and phone numbers of over three million hotel guests

    scenario 2
    Weaknesses in the platform’s security practices.

  271. Scenario 1: The names, email address and phone numbers of over three million hotel guests.
    Scenario 2: Weaknesses in the platform’s security practices.

  272. scenario 1; The names, email address and phone numbers of over three million hotel guests
    scenario 2; Weaknesses in the platform’s security practices.

  273. Scenario 1: The username and password of all of the hotel’s employees.
    Scenario 2:Weaknesses in the platform’s security practices.

  274. Scenario 1

    The names, email addresses, and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platform’s security practices.

  275. Scenario 1 : The names, email address and phone numbers of over three Million hotel guests.

    Scenario 2: Weaknesses in the platforms security practices.

  276. Scenario 1 : The names, email address and phone numbers of over three Million hotel guests.

    Scenario 2: Weaknesses in the platforms security practices.

  277. Scenario 1: The username and password of all of the hotel’s employees.
    Scenario 2:Weaknesses in the platform’s security practices.

  278. Scenario 1;The username and password of all of the hotel’s employees.
    Scenario 2; Weaknesses in the platform’s security practices.

  279. SCENARIO 1;The username and password of all of the hotel’s employees.
    SCENARIO 2; Weaknesses in the platform’s security practices.

  280. Scenario 1
    The hotel chain’s reputation

    Scenario 2
    Extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer.

  281. The names, email address and phone numbers of over three million hotel guests.

    Weaknesses in the platform’s security practices.

  282. Scenario 1:

    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2:

    Weaknesses in the platform’s security practices.

  283. Scenario 1
    The card payment information of over three million guests.
    Scenario 2
    Weaknesses in the platform’s security practices.

  284. The names, email address and phone numbers of over three million hotel guests
    Weaknesses in the platform’s security practices

  285. Scenario 1, The names, email address and phone numbers of over three million hotel guests.

    Scenario 2, Weaknesses in the platform’s security practices.

    1. Scenario 1

      The names, email address and phone numbers of over three million hotel guests.

      Scenario 2

      Weaknesses in the platform’s security practices.

  286. Cyber security: Day 2 Assignment

    Scenario 1 : The hotel chain’s reputation.

    Scenario 2 : Weaknesses in the platform’s security practices.