Scenario 1

Security breaches today are all too common, with attackers constantly finding new and innovative ways of infiltrating organizations in search of valuable information.

Scroll down to read the latest breaking security news headline.

What Happened?

According to our sources, a well known hotel chain that operates across the world has reported a massive data breach, with the personal information of over three million guests exposed to hackers.

The hotel discovered that hackers gained access to its customer database by using the login details of one of its employees.

At this point, the hotel doesn’t believe that the hackers were able to access any account passwords or financial information. Recent guests are encouraged to check the hotel chain’s web portal to see if they have been impacted by this breach.

*This is a fictional scenario.

This is a multiple choice question. Once you have selected an option, select the submit button below to submit your answer.

In this example, what did the hackers take?

Select the correct answer, then Submit.

  1. The card payment information of over three million guests.
  2. The names, email address and phone numbers of over three million hotel guests.
  3. The hotel chain’s reputation.
  4. The username and password of all of the hotel’s employees.

Scenario 2

eLearning Platforms at Risk!

The team at DEXA is concerned. eLearning platforms are becoming prime targets for attackers as more and more organizations make the move to digital learning.

SCROLL down to find out more about a recent case.*

A popular online training platform admitted leaving the personal data of millions of its students (many of them minors) exposed on a publicly accessible cloud database.

Hackers were able to directly access students’ full names, email addresses, phone numbers, and school enrollment details from the Internet!

While it’s unclear what the hackers have done with this acquired information, it’s safe to say that they have everything they need to carry out widespread phishing or malware attacks.

What Exploits?

What exploits did the hackers use in this case to gain access to valuable personal information?

Select the correct answer, then Submit.

  • Weaknesses in the platform’s security practices.
  • Extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer.
  • Bypassing the platform’s access control methods.
  • Taking advantage of student information not being correctly validated on the platform.

Leave a Reply

Your email address will not be published. Required fields are marked *

2,326 thoughts on “Discussion Assignment Cyber Security Course- What was Taken?

  1. Scenario one:The card payment information of over three million guests
    Scenario two:Weaknesses in the platform’s security practices

  2. Augustine Anuoluwapo
    Scenario 1
    The card payment information of over three million guests.
    Scenario 2
    Weaknesses in the platform’s security practices.

  3. Scenario 1
    The card payment information of over three million guests.

    Scenario 2
    Weaknesses in the platform’s security practices.

  4. Scenario 1 Answer: The names, email address and phone numbers of over three million hotel guests.

    Scenario 2 Answer: Weaknesses in the platform’s security practices

  5. 1.The card payment information of over three million guests.
    2.Weaknesses in the platform’s security practices.

  6. Scenario 1: The names, email address and phone numbers of over three million hotel guests.
    Scenario 2:Weaknesses in the platform’s security practices

  7. Scenario 1: a) The names, email addresses and phone numbers of over 300million guests.

    b) The hotel chains reputation

    Scenario 2: Weaknesses in the platforms security practices.

  8. Scenario 1: The names, email address and phone numbers of over three million hotel guests.
    Scenario 2:Weaknesses in the platform’s security practices.

  9. Scenario 1: The names, email address and phone numbers of over three million hotel guests.
    Scenario 2: Weaknesses in the platform’s security practices.

  10. Extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer.

  11. senario 1; The username and password of all of the hotel’s employees.

    senario 2; Weaknesses in the platform’s security practices.

  12. Ouestion 1: The names, email address and phone numbers of over three million hotel guests.

    Question 2: Weaknesses in the platform’s security practices.

    1. scenario1. The names, email address and phone numbers of over three million hotel guests.
      scenario2. weakness in the platform’s security practices.

  13. 1. The names, email addresses, and phone numbers of over three million hotel guests.
    2. Weaknesses in the platform’s security practices.

  14. The names, email address and phone numbers of over three million hotel guests.

    Weaknesses in the platform’s security practices

  15. 1. The names, email addresses, and phone numbers of over three million hotel guests.
    2. Weaknesses in the platform’s security practices.

  16. Ouestion 1: The names, email address and phone numbers of over three million hotel guests.

    Question 2: Weaknesses in the platform’s security practices.

  17. Ouestion 1: The names, email address and phone numbers of over three million hotel guests.

    Question 2: Weaknesses in the platform’s security practices.

  18. Day 2,
    Question 1: Grey hat
    Question 2: Black hat
    Question 3: White hat
    Question 4: Black hat
    Question 5: White hat

  19. Question 1: The username and password of all of the hotel’s employees.

    Question 2:Weaknesses in the platform’s security practices.

  20. Question 1: The names, email address and phone numbers of over three million hotel guests

    Question 2: Weaknesses in the platform’s security practices.

  21. Extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer.

  22. Taking advantage of student information not being correctly validated on the platform.
    The names, email address and phone numbers of over three million hotel guests

  23. The first answer is the names,email address and phone number of over three million hotel guests.

    Scenario number 2 is weakness in the platform’s security practices.

  24. The names, email address and phone numbers of over three million hotel guests.
    2.
    Weaknesses in the platform’s security practices.

  25. Scenario 1.
    The card payment information of over three million guests.
    Scenario 2.
    Weaknesses in the platform’s security practices.

  26. (1). The names, email address and phone numbers of over three million hotel guests.

    (2). Weakness in the platforms practices.

  27. 1. The names, email address and phone numbers of over three million hotel guests.

    2. Weaknesses in the platform’s security practices.

  28. 1. The names, email address and phone numbers of over three million hotel guests.
    2. Weaknesses in the platforms security practices.

  29. 1. The names, email address and phone numbers of over three million hotel guests.
    2. Weaknesses in the platform’s security practices.

  30. Scenario 1 : The card payment information of over three million guests

    Scenario 2: weakness in the platform’s security practices

  31. Scenario 1.
    The names, email addresses and phone numbers of over 3 million hotel guests .
    Scenario 2.
    Weaknesses in the platform’s security practices.

  32. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.
    Scenario 2
    Weaknesses in the platform’s security practices.

  33. Scénario 1
    Les noms, adresses e-mail et numéros de téléphone de plus de trois millions de clients d’hôtels.
    Scénario 2
    Faiblesses dans les pratiques de sécurité de la plateforme.

  34. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platform’s security practices.

  35. Scenario 1 The names, email address and phone numbers of over three million hotel guests.
    Scenario 2 Extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer.

  36. 1. The names, email address and phone numbers of over three million hotel guests.

    2. Taking advantage of student information not being correctly validated on the platform.

  37. Scenario 1. The names, email address and phone numbers of over three million hotel guests.

    Scenario 2. Weaknesses in the platform’s security practices.

  38. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platform’s security practices.

  39. Scenario 1

    2. The names, email address and phone numbers of over three million hotel guests.

    Scenario 2

    Taking advantage of student information not being correctly validated on the platform.

  40. The names, email address and phone numbers of over three million hotel guests. The names, email address and phone numbers of over three million hotel guests

  41. The names, email address and phone numbers of over three million hotel guests and the hotel chains reputation

    Weaknesses in the platforms security practices

  42. The names, email address and phone numbers of over three million hotel guests

    Weaknesses in the platform’s security practices.

  43. Scenario 1
    The username and Password of all the hotel’s employees

    Scenario 2
    Weaknesses in the platform’s security practices

  44. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.
    Scenario 2
    Taking advantage of student information not being correctly validated on the platform

  45. (23/11/2024)
    Day 2: cohort 8 Assessment answers
    Cyber Attackers

    1.Gray hat
    2.Black hat
    3.White hat
    4.Black hat
    5. White hat

  46. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Taking advantage of student information not being correctly validated on the platform.

  47. The names, email address and phone numbers of over three million hotel guests.

    Weaknesses in the platform’s security practices.

  48. Scenerio 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenerio 2
    Weaknesses in the platform’s security practices.

  49. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platform’s security practices.

  50. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Taking advantage of student information not being correctly validated on the platform

  51. Scenario 1:
    The names, email addresses, and phone numbers of over three million hotel guests.
    Scenario 2:
    Weaknesses in the platform’s security practices.

    1. Day 2
      1. Gray hat attacker
      2.Black hat attacker
      3. White hat attacker
      4.Black hat attacker
      5. White hat attacker

  52. Scenario 1:
    The names, email address and phone numbers of over three million hotel guests.
    Scenario 2:
    Weaknesses in the platform’s security practices.

  53. Scenario 1
    1. The card payment information of over three million guests.
    Scenario 2
    2. Extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer.

  54. Scenario 1 The names, email address and phone numbers of over three million hotel guests.
    Scenario 2 Extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer.

  55. Scenario 1.
    The names, email address and phone numbers of over three million hotel guests.
    Scenario 2
    Weaknesses in the platform’s security practices.

  56. Scenario 1:
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2:
    Taking advantage of student information not being correctly validated on the platform.

  57. Scenario 1
    The names, email address and phone numbers of over three million hotel guests

    Scenario 2
    Weaknesses in the platform’s security practices.

  58. 1. The names, email address and phone numbers of over three million hotel guests.
    2. Weaknesses in the platform’s security practice

  59. Weaknesses in the platform’s security practices. For senerio 2

    The username and password of all of the hotel’s employees. For senerio 1

  60. *Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Taking advantage of student information not being correctly validated on the platform.

  61. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer.

  62. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platform’s security practices.

  63. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer.

  64. Scenario 1 The names, email address and phone numbers of over three million hotel guests.
    Scenario 2 Weaknesses in the platform’s security practices.

  65. Scenario 1 answer
    The card payment information of over three million guests.
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2 answer
    Extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer.

    1. Scenario number 1 is the names,email address and phone number of over three million hotel guests.

      Scenario number 2 is weakness in the platform’s security practices.

  66. Scenario 1:
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2:
    Weaknesses in the platform’s security practices.

  67. Scenario 1:
    The names, email address and phone numbers of over three million hotel guests

    Scenario 2:
    Weaknesses in the platform’s security practices.

  68. 1.The names, email address and phone numbers of over three million hotel guests

    2.Weaknesses in the platform’s security practices.

  69. 1. The names, email address and phone numbers of over three million hotel guests.

    2 Taking advantage of student information not being correctly validated on the platform.

  70. Scenerio 1: The names, email address and phone numbers of over three million hotel guests.

    Scenerio 2: Weaknesses in the platform’s security practices.

  71. 1. The names, email address and phone numbers of over three million hotel guests.
    2.Weaknesses in the platform’s security practices.

  72. 1. The names, email address and phone numbers of over three million hotel guests.
    2. Weaknesses in the platform’s security practices.

  73. Scenerio 1: The names, email address and phone numbers of over three million hotel guests.

    Scenerio 2: Weaknesses in the platform’s security practices.

  74. Scenario 1
    Answer: The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Answer: Weaknesses in the platform’s security practices.

  75. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platform’s security practices.

  76. Scenario 1: The card payment information of over three million guests.
    Scenario 2: Weaknesses in the platform’s security practices.

  77. Scenario 1-The names, email address and phone numbers of over three million hotel guests.

    Scenario 2-Weaknesses in the platform’s security practices.

  78. Scenario 1: The names, email address and phone numbers of over three million hotel guests.

    Scenario 2: Weaknesses in the platform’s security practices.
     

  79. Scenario 1: The names, email address and phone numbers of over three million hotel guests.
    Scenario 2: Weaknesses in the platform’s security practices.

  80. Case 1 _ The names, email address and phone numbers of over three million hotel guests.

    Case 2 _ weaknesses in the platform’s security practices

  81. * The names, email address and phone numbers of over three million hotel guests.

    *Weaknesses in the platform’s security practices.

  82. Scenario 1: The names, email address and phone numbers of over three million hotel guests.

    Scenario 2: Weaknesses in the platform’s security practices

  83. Scenario 1 The username and password of all of the hotel’s employees.
    Scenario 2 Weaknesses in the platform’s security practices.

  84. Senerio 1- the names, email address and phone numbers of over 3 million hotel guests

    Senerio 2- weakness in the platforms security practices

  85. Scenerio 1: The names, email address and phone numbers of over three million hotel guests

    Scenario 2: Weaknesses in the platform’s security practices.

  86. Scenario 1: The names, email address and phone numbers of over three million hotel guests

    Scenario 2: Weaknesses in the platform’s security practices.

  87. SCENARIO 1: The names, email addresses, and phone numbers of over three million hotel guests
    SCENARIO 2: Weaknesses in the platform’s security practices.

  88. The names, email address and phone numbers of over three million hotel guests.
    Weaknesses in the platform’s security practices.

  89. Scenario 1: The names, email address and phone numbers of over three million hotel guests.
    Scenario 2: Weaknesses in the platform’s security practices.

  90. SCENERIO 1: The names, email address and phone numbers of over three million hotel guests
    SCENERIO 2: Weaknesses in the platform’s security practices.

  91. SCENARIO 1: The names, email addresses and phone numbers of over three million hotel guests

    SCENARIO 2: Weaknesses in the platform’s security practices.

  92. SCENERIO 1: The names, email address and phone numbers of over three million hotel guests.

    SCENERIO 2: Weaknesses in the platform’s security practices.

  93. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.
    Scenario 2

    Weaknesses in the platform’s security practices.

  94. Scenario 1
    .The hotel chain’s reputation.
    Scenery 2
    Extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer.

  95. The names, email address and phone numbers of over three million hotel guests.

    Weaknesses in the platform’s security practices.

  96. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platform’s security practices.

  97. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platform’s security practices.
    Bypassing the platform’s access control methods

  98. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.
    Scenario 2
    Weaknesses in the platform’s security practices.

  99. 1a. The names, email, address and phone number of over 3 million guest
    B. Hotel chains reputation.
    2. Weakness in the platforms security practices

  100. 1. The names, email addresses, and phone numbers of over three million hotel guests.
    2. Weaknesses in the platform’s security practices.

  101. 1.) The card payment information of over three million guests.
    2.) Weaknesses in the platform’s security practices.

  102. 1.The names, email address and phone numbers of over three million hotel guests.
    2.Weakness in the platforms security practice

  103. 1.The names, email address and phone numbers of over three million hotel guests.
    2. Weaknesses in the platform’s security practices.

  104. 1. The names, email address and phone numbers of over three million hotel guests.
    2. Weaknesses in the platform’s security practices.

  105. 1. The names, email address and phone numbers of over three million hotel guests.

    2. Weaknesses in the platform’s security practices.

  106. 1. The names, email address and phone numbers of over three million hotel guests.
    2. Weaknesses in the platform’s security practices.

  107. 1. The names, email address and phone numbers of over three million hotel guests
    2.Taking advantage of student information not being correctly v

  108. 1. The names, email address and phone numbers of over three million hotel guests
    2.Taking advantage of student information not being correctly validated on the platform.

  109. The names, email address and phone numbers of over three million hotel guests.
    Taking advantage of student information not being correctly validated on the platform.

  110. 1. The names, email address and phone numbers of over three million hotel guests.
    2. Weaknesses in the platform’s security practices.

  111. Question 1
    The names, email address and phone numbers of over three million hotel guests.
    Question 2
    Weaknesses in the platform’s security practices.

  112. Question 1. The username and password of all of the hotel’s employees.
    Question 2. Weaknesses in the platform’s security practices.

  113. Question 1. The names, email address and phone numbers o

    Question 2. Weaknesses in the platform’s security practices.

  114. The names, email address and phone numbers of over three million hotel guests.

    Weaknesses in the platform’s security practices.

  115. The names, email address and phone numbers of over three million hotel guests.

    Weaknesses in the platform’s security practices.

  116. The names, email address and phone numbers of over three million hotel guests.

    Weaknesses in the platform’s security practices.

  117. The names, email address and phone numbers of over three million hotel guests.

    Bypassing the platform’s access control methods

  118. The names, email address and phone numbers of over three million hotel guests.
    Weaknesses in the platform’s security practices.

  119. The card payment information of over three million guests.

    Weaknesses in the platform’s security practices.

    White hat
    Black hat
    White hat
    Black hat
    Grey/White hat

  120. The card payment information of over three million guests.

    Weaknesses in the platform’s security practices.

  121. SCENARIO 1
    The names, email address and phone numbers of over three million hotel guests.

    SCENARIO 2
    Weaknesses in the platform’s security practices.

  122. SCENARIO 1
    The names, email address and phone numbers of over three million hotel guests.
    SCENARIO 2
    Weaknesses in the platform’s security practices.

  123. The card payment information of over three million guests.

    Weaknesses in the platform’s security practices.

  124. Extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer.

  125. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.
    Scenario 2
    Weaknesses in the platform’s security practices.

  126. 1. Weaknesses in the platform’s security practices.
    2.The card payment information of over three million guests.

  127. 1.Weaknesses in the platform’s security practices.

    2.The card payment information of over three million guests.

  128. Scenario 1: The names, email addresses and phone numbers of over three million hotel guests.

    Scenario 2: Taking advantage of students information not being correctly validated on the platform.

  129. Scenario 1: The names, email address and phone numbers of over three million hotel guests
    Scenario 2: Taking advantage of student information not being correctly validated on the platform.

  130. The hotel chain’s reputation.

    memory buffer.

    Taking advantage of student information not being correctly validated on the platform.

  131. The names, email address and phone numbers of over three million hotel guests.
    Weaknesses in the platform’s security practices

  132. The names, email address and phone numbers of over three million hotel guests.

    Weaknesses in the platform’s security practices

  133. The names, email address and phone numbers of over three million hotel guests.

    Weaknesses in the platform’s security practices.

  134. The names, email address and phone numbers of over three million hotel guests.

    Weaknesses in the platform’s security practices.

  135. The names, email address and phone numbers of over three million hotel guests.

    Weaknesses in the platform’s security practices

  136. 1. The names, email address and phone numbers of over three million hotel guests.

    2. Weaknesses in the platform’s security practices.

  137. 1. The names, email address and phone numbers of over three million hotel guests.
    2. Weaknesses in the platform’s security practices.

  138. The names, email address and phone numbers of over three million hotel guests.
    Weaknesses in the platform’s security practices.

  139. The names, email address and phone numbers of over three million hotel guests
    Weaknesses in the platform’s security practices.

  140. Scenario 1

    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2

    Weaknesses in the platform’s security practices.

  141. 1.The name,email address and phone number of over 3 million guest
    2.Weaknesses in the platform’s security practices.

  142. The names, email address and phone numbers of over three million hotel guests.
    2.weaknessess in the platform’s security practices

  143. 1. The names, email address and phone numbers of over three million hotel guests.
    2.weaknessess in the platform’s security practices

  144. Scenario 1 ;The names, email address and phone numbers of over three million hotel guests.

    Scenario 2 ;Weaknesses in the platform’s security practices.

  145. Scenario 1

    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2

    Weaknesses in the platform’s security practices.

  146. Extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer.

  147. Scenario One;
    The names, email address and phone numbers of over three million hotel guests.

    Scenario Two;
    Weaknesses in the platform’s security practices.

  148. Day 1
    The card payment information of over three million guests.

    Weaknesses in the platform’s security practices.

  149. Scenario 1
    It’s safe to say they took:
    The card payment information of over three million guests.

     

    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platform’s security practices

  150. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    The hotel chain’s reputation.
    Scenario 2
    Weaknesses in the platform’s security practices.

  151. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platform’s security practices.

  152. Day 1
    scenario 1
    The names, email address and phone numbers of over three million hotel guests.
    The hotel chain’s reputation.

    Scenario 2
    Weaknesses in the platform’s security practices.
    Bypassing the platform’s access control methods.

  153. day 1
    scenario 1.
    2. the names, email address and phone numbers of over three million guests
    scenario 2.
    weaknesses in the platform’s security practices

  154. DAY 2
    Answers to today’s questions
    1. After hacking into ATM systems remotely using a laptop, this attacker worked with the ATM manufacturers to resolve the identified security vulnerabilities.
    Ans-White hat

    2. This attacker transferred $10 million into their bank account using customer account and PIN credentials gathered from recordings.
    Ans-Black hat

    3. This attacker’s job is to identify weaknesses in a company’s computer system.
    Ans-White hat

    4. This attacker used malware to compromise a company’s system and steal credit card information that was then sold to the highest bidder.
    Ans-Black hat

    5. While carrying out some research, this attacker stumbled across a security vulnerability on an organization’s network that they are authorized to access.
    Ans-White hat

  155. Day 2 answers:
    . After hacking into ATM systems remotely using a laptop, this attacker worked with the ATM manufacturers to resolve the identified security vulnerabilities.

    White hat

    This attacker transferred $10 million into their bank account using customer account and PIN credentials gathered from recordings.

    Black hat

    This attacker’s job is to identify weaknesses in a company’s computer system.

    White hat

    This attacker used malware to compromise a company’s system and steal credit card information that was then sold to the highest bidder.

    Gray hat

    While carrying out some research, this attacker stumbled across a security vulnerability on an organization’s network that they are authorized to access.

    White hat

  156. Scenario 1 :
    The username and password of all of the hotel’s employees.
    Scenario 2:
    Weaknesses in the platform’s security practices.

  157. Scenario 1 :

    The username and password of all of the hotel’s employees.

    Scenario 2:
    Weaknesses in the platform’s security practices.

  158. Scenario 1 – The names, email address and phone numbers of over three million hotel guests.

    Scenario 2 – Weaknesses in the platform’s security practices.

  159. Scenario 1.
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platform’s security practices.

  160. scenario 1 The names, email address and phone numbers of over three million hotel guests.
    Scenario 2, Taking advantage of student information not being correctly validated on the platform

  161. Scenario 2
    Weaknesses in the platform’s security practices.
    Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

  162. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.
    Scenario 2
    Weaknesses in the platform’s security practices.

  163. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.
    Scenario 2
    Weaknesses in the platform’s security practices.

  164. Scenario 1
    The card payment information of over three million guests.
    Scenario 2

    Bypassing the platform’s access control methods.

  165. Scenario 1
    The card payment information of over three million guests.
    Scenario 2
    Weaknesses in the platform’s security practices

  166. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.
    Scenario 2
    Weaknesses in the platform’s security practices

  167. Scenario 1: The names, email addresses and phone numbers of over three million hotel guests
    Scenario 2: Weaknesses in the platform’s security practices

  168. Scenario One: The names, email addresses and phone numbers of over three million hotel guests
    Scenario two: Weaknesses in the platform’s security practices

  169. Extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer

  170. Scene 2
    Extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer.

  171. The card payment information of over three million guests.

    The names, email address and phone numbers of over three million hotel guests.

    The hotel chain’s reputation.
    The username and password of all of the hotel’s employees.

  172. Scenario 2:
    1. Weaknesses in the platform’s security practices.
    2. Extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer.
    3. Bypassing the platform’s access control

  173. Scenario 1: The names, email address and phone numbers of over three million hotel guests.

    The hotel chain’s reputation.
    The username and password of all of the hotel’s employees.

  174. 1.The names, email address and phone numbers of over three million hotel guests.

    2. Weaknesses in the platform’s security practices.

  175. In the first scenario: The hotel chain’s reputation.
    In the second scenario: Weaknesses in the platform’s security practices.

    1. Scenario 1:
      The names, email address and phone numbers of over three million hotel guests.

      Scenario 2:
      Weaknesses in the platform’s security practices.

  176. In the first scenario, The names, email address and phone numbers of over three million hotel guests.
    The second scenario is Weaknesses in the platform’s security practices.

  177. Scenario 1: The names, email address and phone numbers of over three million hotel guests.
    Scenario 2: Bypassing the platform’s access control methods.

  178. Scenario 1: The names, email address and phone numbers of over three million hotel guests.

    Scenario 2: Weaknesses in the platform’s security practices.

  179. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platform’s security practices.

  180. SCENARIO 1: The names, email addresses, and phone numbers of over three million hotel guests
    SCENARIO 2:Weaknesses in the platform’s security practices

  181. Scenario 1: The username and password of all of the hotel’s employees.

    Scenario 2: Weaknesses in the platform’s security practices.

  182. The names, email address and phone numbers of over three million hotel guests
    Weaknesses in the platform’s security practices.

  183. 1. The names, email address and phone numbers of over three million hotel guest
    2. Weaknesses in the platform’s security practices

  184. SCENARIO 1- The names, email address and phone numbers of over three million hotel guests
    SCENARIO 2- Weaknesses in the platform’s security practices.

  185. 1. The names, email address and phone numbers of over three million hotel guests.
    2. Weaknesses in the platform’s security practices.

  186. SCENARIO 1 – Over three million hotel guests’ names, email addresses, and phone numbers.

    SCENARIO 2 – Weaknesses in the platform’s security practices.

  187. SCENARIO 1 – The names, email address and phone numbers of over three million hotel guests.

    SCENARIO 2 – Weaknesses in the platform’s security practices.

  188. Scene 1 The names, email address and phone numbers of over three million hotel guests.
    Scene 2 Weaknesses in the platform’s security practices.

  189. Scene 1:
    The names, email address and phone numbers of over three million hotel guests

    Scene 2:
    Weaknesses in the platform’s security practices.

  190. 1). The names, email address and phone numbers of over three million hotel guests.

    2). Weakness in the platform’s security practices.

  191. Scenario 1:
    2. The names, email address and phone numbers of over three million hotel guests.

    Scenario 2:
    Weaknesses in the platform’s security practices.

  192. Scenario 1. The username and password of all of the hotel’s employees.

    Scenario 2Weaknesses in the platform’s security practices.

  193. Scenario 1
    The names,  email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platform’s security practices.

  194. Scenario 1

    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2

    Weaknesses in the platform’s security practices.

  195. Scenario 1:
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2:
    Weaknesses in the platform’s security practices.

  196. SCENERIO 1
    2. The names, email address and phone numbers of over three million hotel guests

    SCENERIO 2
    Weaknesses in the platform’s security practices.

  197. 1. The names, email address and phone numbers of over three million hotel guests.

    2. Weaknesses in the platform’s security practices.

  198. 1.The names, email address and phone numbers of over three million hotel guests.

    2.Weaknesses in the platform’s security practices.

  199. Scenario 1
    The card payment information of over three million guests.
    The names, email address and phone numbers of over three million hotel guests.
    The hotel chain’s reputation.

    Scenario 2
    Weaknesses in the platform’s security practices

  200. Scenario 1.

    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2

    Weaknesses in the platform’s security practices.

  201. Scenario 1: The names, email address and phone numbers of over three million hotel guests.
    Scenario 2: Weaknesses in the platform’s security practices.

  202. Scenario 1: The names, email addresses, and phone numbers of over three million hotel guests.

    Scenario 2: Weaknesses in the platform’s security practices.

  203. 1. The names, email address and phone numbers of over three million hotel guests.
    2. Weaknesses in the platform’s security practices.

  204. Ofoche Stanley cohort 7 team 5
    Scenario 1: The names, email address and phone numbers of over three million hotel guests.
    Scenario 2: Weaknesses in the platform’s security practices.

  205. Scenario 1. The card payment information of over three million guests.
    Scenario 2. Weaknesses in the platform’s security practices.

  206. scenario 1: The names, email address and phone numbers of over three million hotel guests.

    scenario 2: Weaknesses in the platform’s security practices.

  207. Correction to scenario 2:
    The correct answer is-
    weaknesses in the platforms security practices
    Since they admitted leaving all the student information on a publicly accessible cloud service.

  208. Prisca Ifediba Alachebe- Team 3
    Scenario 1- answer is The names, email address and phone numbers of over three million hotel guests.

    Since the hotel is sure that the financial information of the clients are not affected.

    Scenario 2. Answer-
    Taking advantage of student information not being correctly validated on the platform.

    Since the majority of hacked accounts are minors, they might not have properly validated their account details, therefore exposing them to hack attacks.

  209. The card payment information of over three million guests.

    Weaknesses in the platform’s security practices.

    Taking advantage of student information not being correctly validated on the platform.

  210. 1)The names, email address and phone numbers of over three million hotel guests.
    2)Weaknesses in the platform’s security practices.

  211. 1. The names, email address and phone numbers of over three million hotel guests.

    2. Weaknesses in the platforms security practices

  212. 1st scenario: The names, email address and phone numbers of over three million hotel guests.

    2nd Scenario: Weaknesses in the platform’s security practices.

  213. 1. The names, email address and phone numbers of over three million hotel guests.
    2. Weaknesses in the platform’s security practices.

  214. 1. The names, email address and phone numbers of over three million hotel guests.
    2. Weaknesses in the platform’s security practices.

  215. Scenario 1
    Ans. 2.The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Ans. Weaknesses in the platform’s security practices.

  216. Senario 1
    The names, email address and phone numbers of over three million hotel guests.
    Senario 2
    Weaknesses in the platform’s security practices.

  217. Senario 1
    The names, email address and phone numbers of over three million hotel guests.
    Senario 2
    Weaknesses in the platform’s security practices.

  218. The card payment information of over three million guests.
    The names, email address and phone numbers of over three million hotel guests.
    The hotel chain’s reputation

  219. 1. The names, email address and phone numbers of over three million hotel guests.

    2. Weaknesses in the platform’s security practices

  220. Day 1
    Scenario 1

    The names, email address and phone numbers of over three

    Scenario 2

    Weaknesses in the platform’s security practices

  221. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platforms security practices.

  222. Scenario 1

    The username and password of all of the hotel’s employees.

    Scenario 2

    Weaknesses in the platform’s security practices.

  223. 1, 1he names, email address and phone numbers of over three million hotel guests.

    2,Weaknesses in the platform’s security practices.

  224. Scenario 1:
    The names, email address and phone numbers of over three million hotel guests.
    Scenario 2
    Weaknesses in the platform’s security practices.

  225. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platform’s security practices.

  226. Scenario 1
    The card payment information of over three million guests.
    Scenario 2
    Weaknesses in the platform’s security practices.

  227. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.
    Scenario 2
    Weaknesses in the platform’s security practices.

  228. Scenario 1:
    numbers of over three million hotel guests.
    3. The hotel chain’s reputation.
    Scenario 2:
    Extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer.
    Extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer.

  229. scenario 1: The names, email address and phone numbers of over three million hotel guests. scenario 2: Weaknesses in the platform’s security practices.

  230. Scenario 1: The names, email address and phone numbers of over three million hotel guests.

    Scenario 2: Weaknesses in the platform’s security practices.