Scenario 1
Security breaches today are all too common, with attackers constantly finding new and innovative ways of infiltrating organizations in search of valuable information.
Scroll down to read the latest breaking security news headline.
What Happened?
According to our sources, a well known hotel chain that operates across the world has reported a massive data breach, with the personal information of over three million guests exposed to hackers.
The hotel discovered that hackers gained access to its customer database by using the login details of one of its employees.
At this point, the hotel doesn’t believe that the hackers were able to access any account passwords or financial information. Recent guests are encouraged to check the hotel chain’s web portal to see if they have been impacted by this breach.
*This is a fictional scenario.
This is a multiple choice question. Once you have selected an option, select the submit button below to submit your answer.
In this example, what did the hackers take?
Select the correct answer, then Submit.
- The card payment information of over three million guests.
- The names, email address and phone numbers of over three million hotel guests.
- The hotel chain’s reputation.
- The username and password of all of the hotel’s employees.
Scenario 2
eLearning Platforms at Risk!
The team at DEXA is concerned. eLearning platforms are becoming prime targets for attackers as more and more organizations make the move to digital learning.
SCROLL down to find out more about a recent case.*
A popular online training platform admitted leaving the personal data of millions of its students (many of them minors) exposed on a publicly accessible cloud database.
Hackers were able to directly access students’ full names, email addresses, phone numbers, and school enrollment details from the Internet!
While it’s unclear what the hackers have done with this acquired information, it’s safe to say that they have everything they need to carry out widespread phishing or malware attacks.
What Exploits?
What exploits did the hackers use in this case to gain access to valuable personal information?
Select the correct answer, then Submit.
- Weaknesses in the platform’s security practices.
- Extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer.
- Bypassing the platform’s access control methods.
- Taking advantage of student information not being correctly validated on the platform.
Scenario one:The card payment information of over three million guests
Scenario two:Weaknesses in the platform’s security practices
Augustine Anuoluwapo
My Colour of Hat
1) white hat
2) black hat
3) white hat
4) gray hat
5) gray hat
Augustine Anuoluwapo
Scenario 1
The card payment information of over three million guests.
Scenario 2
Weaknesses in the platform’s security practices.
Scenario 1
The card payment information of over three million guests.
Scenario 2
Weaknesses in the platform’s security practices.
Scenario 1 Answer: The names, email address and phone numbers of over three million hotel guests.
Scenario 2 Answer: Weaknesses in the platform’s security practices
1.The card payment information of over three million guests.
2.Weaknesses in the platform’s security practices.
Scenario 1: The names, email address and phone numbers of over three million hotel guests.
Scenario 2:Weaknesses in the platform’s security practices
Scenario 1: a) The names, email addresses and phone numbers of over 300million guests.
b) The hotel chains reputation
Scenario 2: Weaknesses in the platforms security practices.
Scenario 1: The names, email address and phone numbers of over three million hotel guests.
Scenario 2:Weaknesses in the platform’s security practices.
Weaknesses in the platform’s security practices.
Your point of view caught my eye and was very interesting. Thanks. I have a question for you.
Scenario 1: The names, email address and phone numbers of over three million hotel guests.
Scenario 2: Weaknesses in the platform’s security practices.
Extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer.
The username and password of all of the hotel’s employees
The username and password of all of the hotel’s employees.
senario 1; The username and password of all of the hotel’s employees.
senario 2; Weaknesses in the platform’s security practices.
Ouestion 1: The names, email address and phone numbers of over three million hotel guests.
Question 2: Weaknesses in the platform’s security practices.
scenario1. The names, email address and phone numbers of over three million hotel guests.
scenario2. weakness in the platform’s security practices.
1. The names, email addresses, and phone numbers of over three million hotel guests.
2. Weaknesses in the platform’s security practices.
The names, email address and phone numbers of over three million hotel guests.
Weaknesses in the platform’s security practices
Please how do i join the whatsapp group for Cyber Security students
1. The names, email addresses, and phone numbers of over three million hotel guests.
2. Weaknesses in the platform’s security practices.
The card payment information of over three million guests.
Weaknesses in the platform’s security practices.
The names, email address and phone numbers of over three million hotel guests.
Weaknesses in the platform’s security practices.
Weaknesses in the platform’s security practices.
The names, email address and phone numbers of over three million hotel guests.
Ouestion 1: The names, email address and phone numbers of over three million hotel guests.
Question 2: Weaknesses in the platform’s security practices.
White hat
Black hat
Gray hat
Black hat
White hat
Ouestion 1: The names, email address and phone numbers of over three million hotel guests.
Question 2: Weaknesses in the platform’s security practices.
Day 2,
Question 1: Grey hat
Question 2: Black hat
Question 3: White hat
Question 4: Black hat
Question 5: White hat
Question 1: The username and password of all of the hotel’s employees.
Question 2:Weaknesses in the platform’s security practices.
No, the photos are just inaccessible from the operating system.
Question 1: The names, email address and phone numbers of over three million hotel guests
Question 2: Weaknesses in the platform’s security practices.
Weaknesses in the platform’s security practices.
The card payment information of over three million guests
Extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer.
The card payment information of over three million guests.
The names, email address and phone numbers of over three million hotel guests.
Taking advantage of student information not being correctly validated on the platform.
The names, email address and phone numbers of over three million hotel guests
1. Weaknesses in the platform’s security practices.
2. The names, email address and phone numbers of over three million hotel guests.
The first answer is the names,email address and phone number of over three million hotel guests.
Scenario number 2 is weakness in the platform’s security practices.
The names, email address and phone numbers of over three million hotel guests.
2.
Weaknesses in the platform’s security practices.
Day 2
1. White hat
2. Black hat
3. White hat
4. Gray hat
5. White hat
Day 2
1. White hat
2. Black hat
3. White hat
4. Black hat
5. Gray hat
1. The hotel chain’s reputation
2. Bypassing the platform’s access control methods.
White
Black
Gray
Black
White
Scenario 1.
The card payment information of over three million guests.
Scenario 2.
Weaknesses in the platform’s security practices.
(1). The names, email address and phone numbers of over three million hotel guests.
(2). Weakness in the platforms practices.
1. The names, email address and phone numbers of over three million hotel guests.
2. Weaknesses in the platform’s security practices.
1. white hat
2. black hat
3. gray hat
4. black hat
5. white hat
1. The names, email address and phone numbers of over three million hotel guests.
2. Weaknesses in the platforms security practices.
1. The names, email address and phone numbers of over three million hotel guests.
2. Weaknesses in the platform’s security practices.
Scenario 1 : The card payment information of over three million guests
Scenario 2: weakness in the platform’s security practices
Scenario 1.
The names, email addresses and phone numbers of over 3 million hotel guests .
Scenario 2.
Weaknesses in the platform’s security practices.
1. Gray hat
2. Black hat
3. White hat
4. Black hat
5. Black hat
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices.
White hat
Black hat
Gray hat
Black hat
White hat
Scénario 1
Les noms, adresses e-mail et numéros de téléphone de plus de trois millions de clients d’hôtels.
Scénario 2
Faiblesses dans les pratiques de sécurité de la plateforme.
1. White hat
2. Black hat
3. White hat
4. Black hat
5. Gray hat
1 White Hat
2 Black Hat
3 Grey Hat
4Black Hat
5 White Hat
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices.
1. Gray hat
2. Black hat
3. White hat
4. Black hat
5. Gray hat
Scenario 1 The names, email address and phone numbers of over three million hotel guests.
Scenario 2 Extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer.
1. The names, email address and phone numbers of over three million hotel guests.
2. Taking advantage of student information not being correctly validated on the platform.
Scenario 1. The names, email address and phone numbers of over three million hotel guests.
Scenario 2. Weaknesses in the platform’s security practices.
Weaknesses in the platform’s security practices.
1. Grey hat
2.Black hat
3.White hat
4.Black hat
5.White hat
Day1:
1.The hotel chain’s reputation.
2.Bypassing the platform’s access control methods.
The names, email address and phone numbers of over three million hotel guests.
Weaknesses in the platform’s security practices.
White hat
Black hat
Gray hat
Day 2
1. Grey hat
2.Black hat
3.White hat
4.Black hat
5.White hat
1. White hat
2. Black hat
3. White hat
4. Gray hat
5. White hat
The names, email address and phone numbers of over three million hotel guests.
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices.
Weaknesses in the platform’s security practices.
Scenario 1
2. The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Taking advantage of student information not being correctly validated on the platform.
Day 2
1. Gray hat
2. Black hat
3. White hat
4. Gray hat
5. Gray hat
Day 2
1. Gray hat
2. Black hat
3. White hat
4. Black hat
5. Gray hat
Day 2
1. White hat
2. Black hat
3 White Hat
4. Black hat
5. Black hat
Weaknesses in the platform’s security practices.
The names, email address and phone numbers of over three million hotel guests.
Weaknesses in the platform’s security practices
The names, email address and phone numbers of over three million hotel guests. The names, email address and phone numbers of over three million hotel guests
The names, email address and phone numbers of over three million hotel guests and the hotel chains reputation
Weaknesses in the platforms security practices
The names, email addresses and phone numbers of over three million hotel guests.
The hotel chain’s reputation
Weaknesses in the platform’s security practices
Day 2
1. White Hat
2. Black Hat
3. White Hat
4. Gray Hat
5. Black Hat
Colour of Hat
White
Black
White
Gray
White
The names, email address and phone numbers of over three million hotel guests.
The names, email address and phone numbers of over three million hotel guests
The names, email address and phone numbers of over three million hotel guests
Weaknesses in the platform’s security practices.
What Color Is My Hat?
1. White hat
2. Black hat
3. White hat
4. Grey hat
5. Grey hat
Black hat
White hat
Day 2
Gray hat
Black hat
Gray
Gray
Gray
Weaknesses in the platforms security practices
Weaknesses in the platform’s security practices.
Day 2
White
Black
White
Gray
Gray
The names, email address and phone numbers of over three million hotel guests.
Day 2
Gray hat
Black hat
White hat
Black hat
White hat
Weaknesses in the platform’s security practices.
The card payment information of over three million guests.
White hat
Black hat
White hat
Black hat
Gray hat
Weaknesses in the platform’s security practices.
The hotel chain’s reputation.
1. Weaknesses in the platform’s security practices.
2. The names, email address and phone numbers of over three hotel guests.
COHORT 8, DAY 2:
Gray hat
Black hat
White hat
Black hat
White hat
Scenario 1
The username and Password of all the hotel’s employees
Scenario 2
Weaknesses in the platform’s security practices
The hotel chain’s reputation
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Taking advantage of student information not being correctly validated on the platform
(23/11/2024)
Day 2: cohort 8 Assessment answers
Cyber Attackers
1.Gray hat
2.Black hat
3.White hat
4.Black hat
5. White hat
1. White hat
2. Black hat
3. White hat
4. Gray hat
5. White hat
DAY 2
Assessment answers
1. Grey hat
2. Black hat
3. White hat
4. Black hat
5. White hat
My Day 2 Assessment
1. Gray hat
2. Black hat
3. White hat
4 Black hat
5White hat
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Taking advantage of student information not being correctly validated on the platform.
The names, email address and phone numbers of over three million hotel guests.
Weaknesses in the platform’s security practices.
Cyberattackers
1. Gray hat
2. Black hat
3. White hat
4. Black hat
5. White hat
Scenerio 1
The names, email address and phone numbers of over three million hotel guests.
Scenerio 2
Weaknesses in the platform’s security practices.
Day 2
1. Gray hat
2. Black hat
3. White hat
4. Black hat
5. White hat
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices.
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Taking advantage of student information not being correctly validated on the platform
Scenario 1:
The names, email addresses, and phone numbers of over three million hotel guests.
Scenario 2:
Weaknesses in the platform’s security practices.
Day 2
White hat attackers
Black hat
Gray hat
White hat
White hat
Day 2
White hat
Black hat
White hat
Gray hat
White hat
Day 2
1. Gray hat attacker
2.Black hat attacker
3. White hat attacker
4.Black hat attacker
5. White hat attacker
Scenario 1:
The names, email address and phone numbers of over three million hotel guests.
Scenario 2:
Weaknesses in the platform’s security practices.
scenario 1 : The hotel chain’s reputation
scenario2: Weaknesses in the platform’s security practices.
The names, email address and phone numbers of over three million hotel guests.
Scenario 1
1. The card payment information of over three million guests.
Scenario 2
2. Extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer.
Scenario 1.
The hotel chain’s reputation.
Scenario 2
Weaknesses in the platform’s security practices.
Scenario 1 The names, email address and phone numbers of over three million hotel guests.
Scenario 2 Extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer.
Scenario 1.
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices.
Scenario 1:
The names, email address and phone numbers of over three million hotel guests.
Scenario 2:
Taking advantage of student information not being correctly validated on the platform.
Day 2
Assessment Answers
1. White hat
2. Black hat
3. White hat
4, Black hat
5. Gray hat
1. Gray Hat
2. Black Hat
3. White Hat
4. Black Hat
5. White Hat
1. White hat
2. Black hat
3. Gray hat
4. Black hat
5. White hat
Day 2
Assessment Answers
1. White hat
2.White hat
3. Black hat
4.White hat
5. Grey hat
Correct Answer for Day 2
Assessment Answers
1. White hat
2. Black hat
3. White hat
4, Black hat
5. Gray hat
Scenario 1
Hotels chains reputation
scenario 2
Weakness in the platform security practices.
Scenario 1
The names, email address and phone numbers of over three million hotel guests
Scenario 2
Weaknesses in the platform’s security practices.
1. The names, email address and phone numbers of over three million hotel guests.
2. Weaknesses in the platform’s security practice
Weaknesses in the platform’s security practices. For senerio 2
The username and password of all of the hotel’s employees. For senerio 1
*Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Taking advantage of student information not being correctly validated on the platform.
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer.
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices.
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer.
Day 2 cohort 8
1.White hat
2. Black hat
3. White hat
4. Black hat
5. White hat
Scenario 1 The names, email address and phone numbers of over three million hotel guests.
Scenario 2 Weaknesses in the platform’s security practices.
Scenario 1 answer
The card payment information of over three million guests.
The names, email address and phone numbers of over three million hotel guests.
Scenario 2 answer
Extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer.
Day 2, cohort 8 answers
1. Grey hat
2. Black hat
3. White hat
4. Black hat
5. White hat
Scenario 1: The hotel chain’s reputation.
Scenario 2: Weaknesses in the platform’s security practices.
Scenario number 1 is the names,email address and phone number of over three million hotel guests.
Scenario number 2 is weakness in the platform’s security practices.
3 is my Answer
Scenario 1:
The names, email address and phone numbers of over three million hotel guests.
Scenario 2:
Weaknesses in the platform’s security practices.
Scenario 1
3.The hotel chain’s reputation
Scenario 2
Weaknesses in the platform’s security practices.
Scenario 1:
The names, email address and phone numbers of over three million hotel guests
Scenario 2:
Weaknesses in the platform’s security practices.
1.The names, email address and phone numbers of over three million hotel guests
2.Weaknesses in the platform’s security practices.
The hotel chain’s reputation.
1. The names, email address and phone numbers of over three million hotel guests.
2 Taking advantage of student information not being correctly validated on the platform.
2.Weaknesses in the platform’s security practices.
The names, email address and phone numbers of over three million hotel guests.
Scenerio 1: The names, email address and phone numbers of over three million hotel guests.
Scenerio 2: Weaknesses in the platform’s security practices.
1. The names, email address and phone numbers of over three million hotel guests.
2.Weaknesses in the platform’s security practices.
1. The names, email address and phone numbers of over three million hotel guests.
2. Weaknesses in the platform’s security practices.
Scenerio 1: The names, email address and phone numbers of over three million hotel guests.
Scenerio 2: Weaknesses in the platform’s security practices.
Scenario 1
Answer: The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Answer: Weaknesses in the platform’s security practices.
Weaknesses in the platform’s security practices.
The names, email address and phone numbers of over three million hotel guests.
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices.
Scenario 1: The card payment information of over three million guests.
Scenario 2: Weaknesses in the platform’s security practices.
Scenario 1-The names, email address and phone numbers of over three million hotel guests.
Scenario 2-Weaknesses in the platform’s security practices.
Scenario 1: The names, email address and phone numbers of over three million hotel guests.
Scenario 2: Weaknesses in the platform’s security practices.
Scenario 1: The names, email address and phone numbers of over three million hotel guests.
Scenario 2: Weaknesses in the platform’s security practices.
Case 1 _ The names, email address and phone numbers of over three million hotel guests.
Case 2 _ weaknesses in the platform’s security practices
* The names, email address and phone numbers of over three million hotel guests.
*Weaknesses in the platform’s security practices.
Scenario 1: The names, email address and phone numbers of over three million hotel guests.
Scenario 2: Weaknesses in the platform’s security practices
Scenario 1 The username and password of all of the hotel’s employees.
Scenario 2 Weaknesses in the platform’s security practices.
Weaknesses in the platform’s security practices.
Senerio 1- the names, email address and phone numbers of over 3 million hotel guests
Senerio 2- weakness in the platforms security practices
Scenerio 1: The names, email address and phone numbers of over three million hotel guests
Scenario 2: Weaknesses in the platform’s security practices.
Scenario 1: The hotel chain’s reputation.
Scenario 2: Weaknesses in the platform’s security practices.
Scenario 1: The names, email address and phone numbers of over three million hotel guests
Scenario 2: Weaknesses in the platform’s security practices.
SCENARIO 1: The names, email addresses, and phone numbers of over three million hotel guests
SCENARIO 2: Weaknesses in the platform’s security practices.
The names, email address and phone numbers of over three million hotel guests.
Weaknesses in the platform’s security practices.
Scenario 1: The names, email address and phone numbers of over three million hotel guests.
Scenario 2: Weaknesses in the platform’s security practices.
SCENERIO 1: The names, email address and phone numbers of over three million hotel guests
SCENERIO 2: Weaknesses in the platform’s security practices.
SCENARIO 1: The names, email addresses and phone numbers of over three million hotel guests
SCENARIO 2: Weaknesses in the platform’s security practices.
Weaknesses in the platform’s security practices.
The names, email address and phone numbers of over three million hotel guests.
SCENERIO 1: The names, email address and phone numbers of over three million hotel guests.
SCENERIO 2: Weaknesses in the platform’s security practices.
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices.
SCENARIO 2
Weaknesses in the platform’s security practices.
SCENARIO 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Taking advantage of student information not being correctly validated on the platform.
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices
Scenero 1
The username and password of all of the hotel’s employees.
Scenario 1
.The hotel chain’s reputation.
Scenery 2
Extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer.
The names, email address and phone numbers of over three million hotel guests.
Weaknesses in the platform’s security practices.
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices.
Weaknesses in the platform’s security practices
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices.
Bypassing the platform’s access control methods
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Bypassing the platform’s access control methods.
Scenario 1
The username and password of all of the hotel’s employees.
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices.
Weaknesses in the platform’s security practices.
The card payment information of over three million guests.
1. White
2. Black
3. White
4. Gray
5. White
Weaknesses in the platform’s security practices.
The card payment information of over three million guests.
Weaknesses in the platform’s security practices
The card payment information of over three million guest
1 white hat
2 black hat
3 Gray hat
4 black hat
5 white hat
1a. The names, email, address and phone number of over 3 million guest
B. Hotel chains reputation.
2. Weakness in the platforms security practices
1. The names, email addresses, and phone numbers of over three million hotel guests.
2. Weaknesses in the platform’s security practices.
1.) The card payment information of over three million guests.
2.) Weaknesses in the platform’s security practices.
1.The names, email address and phone numbers of over three million hotel guests.
2.Weakness in the platforms security practice
1.The names, email address and phone numbers of over three million hotel guests.
2. Weaknesses in the platform’s security practices.
1. The names, email address and phone numbers of over three million hotel guests.
2. Weaknesses in the platform’s security practices.
Weaknesses in the platform’s security practices.
Bypassing the platform’s access control methods.
1. The names, email address and phone numbers of over three million hotel guests.
2. Weaknesses in the platform’s security practices.
2 Weaknesses in the platform’s security practices.
Dexa is a place to learn indeed. Am really enjoying the training
1. The names, email address and phone numbers of over three million hotel guests.
2. Weaknesses in the platform’s security practices.
1. The names, email address and phone numbers of over three million hotel guests
2.Taking advantage of student information not being correctly v
1. The hotel’s chain reputation
2. Weaknesses in the platform security practices
1. The names, email address and phone numbers of over three million hotel guests
2.Taking advantage of student information not being correctly validated on the platform.
1. Gray hat
2. Black hat
3. White hat
4. Black hat
5. Gray hat
The names, email address and phone numbers of over three million hotel guests.
Weaknesses in the platform’s security practices.
1. White hat
2. Black hat
3. White hat
4. Black hat
5. White/Gray hat
Weaknesses in the platform’s security practices.
The names, email address and phone numbers of over three million hotel guests.
The names, email address and phone numbers of over three million hotel guests.
Weaknesses in the platform’s security practices.
Weaknesses in the platform’s security practices.
The names, email address and phone numbers of over three million hotel guests.
They exploited It using the weaknesses in the Platforms Security practices
Weaknesses in the platform’s security practices.
The username and password of all of the hotel’s employees.
The username and password of all of the hotel’s employees.
Weaknesses in the platform’s security practices.
Weaknesses in the platform’s security practices.
The names, email address and phone numbers of over three million hotel guests.
Taking advantage of student information not being correctly validated on the platform.
1. The names, email address and phone numbers of over three million hotel guests.
2. Weaknesses in the platform’s security practices.
Question 1
The names, email address and phone numbers of over three million hotel guests.
Question 2
Weaknesses in the platform’s security practices.
White hat
Black hat
Gray hat
Black hat
Gray Hat
Question 1. The username and password of all of the hotel’s employees.
Question 2. Weaknesses in the platform’s security practices.
Question 1. The names, email address and phone numbers o
Question 2. Weaknesses in the platform’s security practices.
1) black hat
2)gray hat
3)white hat
4) black hat
5)gray hat
The names, email address and phone numbers of over three million hotel guests.
Weaknesses in the platform’s security practices.
Second test
white hat
Black hat
White hat
Black hat
White hat
The names, email address and phone numbers of over three million hotel guests.
Weaknesses in the platform’s security practices.
The names, email address and phone numbers of over three million hotel guests.
Weaknesses in the platform’s security practices.
The names, email address and phone numbers of over three million hotel guests.
Bypassing the platform’s access control methods
The names, email address and phone numbers of over three million hotel guests.
Weaknesses in the platform’s security practices.
The card payment information of over three million guests.
Weaknesses in the platform’s security practices.
White hat
Black hat
White hat
Black hat
Grey/White hat
The card payment information of over three million guests.
Weaknesses in the platform’s security practices.
1. Gray
2. Black
3. White
4. Black
5. White
SCENARIO 1
The names, email address and phone numbers of over three million hotel guests.
SCENARIO 2
Weaknesses in the platform’s security practices.
SCENARIO 1
The names, email address and phone numbers of over three million hotel guests.
SCENARIO 2
Weaknesses in the platform’s security practices.
The card payment information of over three million guests.
Weaknesses in the platform’s security practices.
Extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer.
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices.
Scenario 1:
The hotel chain’s reputation.
Scenario 2:
Weaknesses in the platform’s security practices
2)Weaknesses in the platform’s security practices.
1)The hotel chain’s reputation.
On the questions on categories of hackers
1. Grey hat
2. Black hat
3. White hat
4. Black hat
5. Grey hat
Gray hat
Black hat
White hat
Gray hat
White hat
Weaknesses in the platform’s security practices.
Scenerio 2. Weaknesses in the platform’s security practices.
Scenerio 1. The names, email address and phone numbers of over three million hotel guests.
On Cyber Attack
1 Gray hat
2 Black hat
3 White hat
4 Gray hat
5 White hat
1. Weaknesses in the platform’s security practices.
2.The card payment information of over three million guests.
Weaknesses in the platform’s security practices.
The names, email address and phone numbers of over three million hotel guests.
1.Weaknesses in the platform’s security practices.
2.The card payment information of over three million guests.
White hat
Black hat
White hat
Black hat
Grey hat
Weaknesses in the platform’s security practices.
Scenario 1: The names, email address and phone numbers of over three million hotel guests.
On Cyber Attack
1 Gray hat
2 Black hat
3 White hat
4 Gray hat
5 White hat
Scenario 1: The names, email addresses and phone numbers of over three million hotel guests.
Scenario 2: Taking advantage of students information not being correctly validated on the platform.
Scenario 1: The names, email address and phone numbers of over three million hotel guests
Scenario 2: Taking advantage of student information not being correctly validated on the platform.
The hotel chain’s reputation.
memory buffer.
Taking advantage of student information not being correctly validated on the platform.
Day 2
1. White hat hackers
2. Black hat hackers
3. White hat hackers
4. Gray hat hackers
5. White hat hackers
Scenario 1
The hotel chain’s reputation.
Scenario 2
Weaknesses in the platform’s security practices.
The names, email address and phone numbers of over three million hotel guests.
Weaknesses in the platform’s security practices
The names, email address and phone numbers of over three million hotel guests.
Weaknesses in the platform’s security practices
The names, email address and phone numbers of over three million hotel guests.
Weaknesses in the platform’s security practices.
The names, email address and phone numbers of over three million hotel guests.
Weaknesses in the platform’s security practices.
The names, email address and phone numbers of over three million hotel guests.
Weaknesses in the platform’s security practices
* Gray hat
* Black hat
* White hat
* Gray hat
* White hat
1. The names, email address and phone numbers of over three million hotel guests.
2. Weaknesses in the platform’s security practices.
1. The names, email address and phone numbers of over three million hotel guests.
2. Weaknesses in the platform’s security practices.
The names, email address and phone numbers of over three million hotel guests.
Weaknesses in the platform’s security practices.
Gray hat
Black hat
White hat
Grey hat
The names, email address and phone numbers of over three million hotel guests
Weaknesses in the platform’s security practices.
White hat
Black hat
White hat
Black hat
Gray hat
Scenario 2
Weaknesses in the platform’s security practices.
The hotel chain’s reputation.
Grey hat
Black hat
White hat
Black hat
White hat.
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices.
*Gray Hat Attackers
*Black Hat Attackers
*White Hat Attacters
*Black Hat Attackers
*Gray Hat Attackers
1.The name,email address and phone number of over 3 million guest
2.Weaknesses in the platform’s security practices.
1]Black hat
2]Black hat
3]White hat
4]Black hat
5]Black hat
The names, email address and phone numbers of over three million hotel guests
Day 2
1- Gray hat
2- Black hat
3- white hat
4- Black hat
5- Gray hat
Answers to questions for day 2
1. White hat
2. Black hat
3. White hat
4. Black hat
5. Gray hat
The names, email address and phone numbers of over three million hotel guests.
The names, email address and phone numbers of over three million hotel guests.
2.weaknessess in the platform’s security practices
1. The names, email address and phone numbers of over three million hotel guests.
2.weaknessess in the platform’s security practices
Scenario 1 ;The names, email address and phone numbers of over three million hotel guests.
Scenario 2 ;Weaknesses in the platform’s security practices.
Scenario 1
The hotel chain reputation
Scenario 2
Weakness in the platform security practices
Weaknesses in the platform’s security practices.
The names, email address and phone numbers of over three million hotel guests.
The names, email address and phone numbers of over three million hotel guests.
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices.
Extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer.
The names, email address and phone numbers of over three million hotel guests.
Scenario One;
The names, email address and phone numbers of over three million hotel guests.
Scenario Two;
Weaknesses in the platform’s security practices.
Weaknesses in the platform’s security practices.
senerio 1
3; The hotel chain’s reputation
senerio 2
1; weakness in the platform’s security practices
Day 1
The card payment information of over three million guests.
Weaknesses in the platform’s security practices.
Scenario 1
It’s safe to say they took:
The card payment information of over three million guests.
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices
What colour of Hat
1. White hat
2. Black Hat
3.White hat
4.Black Hat
5.White Hat
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
The hotel chain’s reputation.
Scenario 2
Weaknesses in the platform’s security practices.
DAY 2
1. White hat
2. Black hat
3. White hat
4. Black hat
5. Gray hat
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices.
Day 2
1. White hat
2. Black hat
3. White hat
4. Gray hat
5. White hat
1.White hat
2.Black hat
3.White hat
4.Black hat
5.Gray hat
Day 1
scenario 1
The names, email address and phone numbers of over three million hotel guests.
The hotel chain’s reputation.
Scenario 2
Weaknesses in the platform’s security practices.
Bypassing the platform’s access control methods.
day 1
scenario 1.
2. the names, email address and phone numbers of over three million guests
scenario 2.
weaknesses in the platform’s security practices
Day 2
1. Grey hat
2. Black hat
3. Whit hat
4. Black hat
5. White hat
Scenario 1 :
The hotel chain’s reputation.
Scenario 2:
Weaknesses in the platform’s security practices.
DAY 1
1. The hotel chain’s reputation.
2. Weaknesses in the platform’s security practice
DAY 2
Answers to today’s questions
1. After hacking into ATM systems remotely using a laptop, this attacker worked with the ATM manufacturers to resolve the identified security vulnerabilities.
Ans-White hat
2. This attacker transferred $10 million into their bank account using customer account and PIN credentials gathered from recordings.
Ans-Black hat
3. This attacker’s job is to identify weaknesses in a company’s computer system.
Ans-White hat
4. This attacker used malware to compromise a company’s system and steal credit card information that was then sold to the highest bidder.
Ans-Black hat
5. While carrying out some research, this attacker stumbled across a security vulnerability on an organization’s network that they are authorized to access.
Ans-White hat
Day 2 answers:
. After hacking into ATM systems remotely using a laptop, this attacker worked with the ATM manufacturers to resolve the identified security vulnerabilities.
White hat
This attacker transferred $10 million into their bank account using customer account and PIN credentials gathered from recordings.
Black hat
This attacker’s job is to identify weaknesses in a company’s computer system.
White hat
This attacker used malware to compromise a company’s system and steal credit card information that was then sold to the highest bidder.
Gray hat
While carrying out some research, this attacker stumbled across a security vulnerability on an organization’s network that they are authorized to access.
White hat
Scenario 1 :
The username and password of all of the hotel’s employees.
Scenario 2:
Weaknesses in the platform’s security practices.
Day 2 Answers:
1. White hat
2. Black Hat
3. White Hat
4. Grey hat
5. White Hat
Weaknesses in the platform’s security practices.
Scenario 1 :
The username and password of all of the hotel’s employees.
Scenario 2:
Weaknesses in the platform’s security practices.
1. White hat
2. Black hat
3. Gray hat
4. Black hat
5. White hat
1. White hat
2. Black hat
3. White hat
4. Black hat
5. White hat
1. White hat
2. Black hat
3. White hat
4. Black hat
5. White hat
Scenario 1 – The names, email address and phone numbers of over three million hotel guests.
Scenario 2 – Weaknesses in the platform’s security practices.
Day 2:
1. White hat
2. Black hat
3. White hat
4. Black hat
5. White hat
Scenario 1.
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices.
scenario 1 The names, email address and phone numbers of over three million hotel guests.
Scenario 2, Taking advantage of student information not being correctly validated on the platform
Day 2:
1. Gray hat
2. Black hat
3. White hat
4. Black hat
5. White hat
Scenario 2
Weaknesses in the platform’s security practices.
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices.
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices.
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices.
Scenario 1
The card payment information of over three million guests.
Scenario 2
Bypassing the platform’s access control methods.
Scenario 1
The card payment information of over three million guests.
Scenario 2
Weaknesses in the platform’s security practices
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices
Scenario 1: The names, email addresses and phone numbers of over three million hotel guests
Scenario 2: Weaknesses in the platform’s security practices
Scenario One: The names, email addresses and phone numbers of over three million hotel guests
Scenario two: Weaknesses in the platform’s security practices
Weaknesses in the platform’s security practices.
The names, email address and phone numbers of over three million hotel guests.
Bypassing the platform’s access control methods.
Weaknesses in the platform’s security practices.
The names, email address and phone numbers of over three million hotel guests.
The names, email address and phone numbers of over three million hotel guests.
The names, email address and phone numbers of over three million hotel guests
Extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer
Scene 2
Extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer.
The card payment information of over three million guests.
The names, email address and phone numbers of over three million hotel guests.
The hotel chain’s reputation.
The username and password of all of the hotel’s employees.
Weaknesses in the platform’s security practices.
Scenario 2:
1. Weaknesses in the platform’s security practices.
2. Extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer.
3. Bypassing the platform’s access control
Scenario 1: The names, email address and phone numbers of over three million hotel guests.
The hotel chain’s reputation.
The username and password of all of the hotel’s employees.
1.The names, email address and phone numbers of over three million hotel guests.
2. Weaknesses in the platform’s security practices.
In the first scenario: The hotel chain’s reputation.
In the second scenario: Weaknesses in the platform’s security practices.
Scenario 1:
The names, email address and phone numbers of over three million hotel guests.
Scenario 2:
Weaknesses in the platform’s security practices.
In the first scenario, The names, email address and phone numbers of over three million hotel guests.
The second scenario is Weaknesses in the platform’s security practices.
Scenario 1. The hotel chain’s reputation.
Scenario 2. Weaknesses in the platform’s security practices.
Scenario 1: The names, email address and phone numbers of over three million hotel guests.
Scenario 2: Bypassing the platform’s access control methods.
Scenario 1: The names, email address and phone numbers of over three million hotel guests.
Scenario 2: Weaknesses in the platform’s security practices.
Weaknesses in the platform’s security practices.
Scenario 1: The hotel chain’s reputation.
Scenario 2: Weaknesses in the platform’s security practices
The names, email address and phone numbers of over three million hotel guests.
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices.
The hotel chain’s reputation.
Weaknesses in the platform’s security practices.
SCENARIO 1: The names, email addresses, and phone numbers of over three million hotel guests
SCENARIO 2:Weaknesses in the platform’s security practices
Scenario 1: The username and password of all of the hotel’s employees.
Scenario 2: Weaknesses in the platform’s security practices.
3. The hotel’s chain reputation
Scenario 2: weakness in the platform’s security practice
The names, email address and phone numbers of over three million hotel guests
Weaknesses in the platform’s security practices.
1. The names, email address and phone numbers of over three million hotel guest
2. Weaknesses in the platform’s security practices
SCENARIO 1- The names, email address and phone numbers of over three million hotel guests
SCENARIO 2- Weaknesses in the platform’s security practices.
1. The names, email address and phone numbers of over three million hotel guests.
2. Weaknesses in the platform’s security practices.
SCENARIO 1 – Over three million hotel guests’ names, email addresses, and phone numbers.
SCENARIO 2 – Weaknesses in the platform’s security practices.
SCENARIO 1 – The names, email address and phone numbers of over three million hotel guests.
SCENARIO 2 – Weaknesses in the platform’s security practices.
Scene 1 The names, email address and phone numbers of over three million hotel guests.
Scene 2 Weaknesses in the platform’s security practices.
Scene 1:
The names, email address and phone numbers of over three million hotel guests
Scene 2:
Weaknesses in the platform’s security practices.
1). The names, email address and phone numbers of over three million hotel guests.
2). Weakness in the platform’s security practices.
Scenario 1:
2. The names, email address and phone numbers of over three million hotel guests.
Scenario 2:
Weaknesses in the platform’s security practices.
Scenario 1. The username and password of all of the hotel’s employees.
Scenario 2Weaknesses in the platform’s security practices.
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices.
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices.
Scenario 1:
The names, email address and phone numbers of over three million hotel guests.
Scenario 2:
Weaknesses in the platform’s security practices.
SCENERIO 1
2. The names, email address and phone numbers of over three million hotel guests
SCENERIO 2
Weaknesses in the platform’s security practices.
1. The names, email address and phone numbers of over three million hotel guests.
2. Weaknesses in the platform’s security practices.
1.The names, email address and phone numbers of over three million hotel guests.
2.Weaknesses in the platform’s security practices.
Scenario 1
The card payment information of over three million guests.
The names, email address and phone numbers of over three million hotel guests.
The hotel chain’s reputation.
Scenario 2
Weaknesses in the platform’s security practices
Scenario 1.
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices.
Scenario 1: The names, email address and phone numbers of over three million hotel guests.
Scenario 2: Weaknesses in the platform’s security practices.
Scenario 1: The names, email addresses, and phone numbers of over three million hotel guests.
Scenario 2: Weaknesses in the platform’s security practices.
1. The names, email address and phone numbers of over three million hotel guests.
2. Weaknesses in the platform’s security practices.
Ofoche Stanley cohort 7 team 5
Scenario 1: The names, email address and phone numbers of over three million hotel guests.
Scenario 2: Weaknesses in the platform’s security practices.
Scenario 1. The card payment information of over three million guests.
Scenario 2. Weaknesses in the platform’s security practices.
scenario 1: The names, email address and phone numbers of over three million hotel guests.
scenario 2: Weaknesses in the platform’s security practices.
Correction to scenario 2:
The correct answer is-
weaknesses in the platforms security practices
Since they admitted leaving all the student information on a publicly accessible cloud service.
Prisca Ifediba Alachebe- Team 3
Scenario 1- answer is The names, email address and phone numbers of over three million hotel guests.
Since the hotel is sure that the financial information of the clients are not affected.
Scenario 2. Answer-
Taking advantage of student information not being correctly validated on the platform.
Since the majority of hacked accounts are minors, they might not have properly validated their account details, therefore exposing them to hack attacks.
The card payment information of over three million guests.
Weaknesses in the platform’s security practices.
Taking advantage of student information not being correctly validated on the platform.
1)The names, email address and phone numbers of over three million hotel guests.
2)Weaknesses in the platform’s security practices.
Weaknesses in the platform’s security practices.
1. The names, email address and phone numbers of over three million hotel guests.
2. Weaknesses in the platforms security practices
1st scenario: The names, email address and phone numbers of over three million hotel guests.
2nd Scenario: Weaknesses in the platform’s security practices.
1. The names, email address and phone numbers of over three million hotel guests.
2. Weaknesses in the platform’s security practices.
1. The names, email address and phone numbers of over three million hotel guests.
2. Weaknesses in the platform’s security practices.
Scenario 1
Ans. 2.The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Ans. Weaknesses in the platform’s security practices.
Senario 1
The names, email address and phone numbers of over three million hotel guests.
Senario 2
Weaknesses in the platform’s security practices.
Senario 1
The names, email address and phone numbers of over three million hotel guests.
Senario 2
Weaknesses in the platform’s security practices.
White hat
Black hat
White hat
Gray hat
White hat
Weaknesses in the platform’s security practices.
The card payment information of over three million guests.
The names, email address and phone numbers of over three million hotel guests.
The hotel chain’s reputation
1. The names, email address and phone numbers of over three million hotel guests.
2. Weaknesses in the platform’s security practices
The names, email address and phone numbers of over three million hotel guests.
Day 1
Scenario 1
The names, email address and phone numbers of over three
Scenario 2
Weaknesses in the platform’s security practices
1 Router
2 Firewall
3 VPN
4 Antimalware
1.Gray hat
2.Black hat
3.White hat
4.Black hat
5.Gray hat
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platforms security practices.
Day 2: Hackers/Attackers.
1. Gray hat
2. Black hat
3. White hat
4. Black hat
5. White hat
The hackers took the information of the hotel hotel customers, by gaining access through the employees details.
Day 2
White hat
Black hat
Gray hat
Grey hat
White hat
Scenario 1
The username and password of all of the hotel’s employees.
Scenario 2
Weaknesses in the platform’s security practices.
1. Gray hat
2. Black hat
3. White hat
4. Black hat
5. White hat
1, White hat
2, Black Hat
3, Gray Hat
4, Black Hat
5,White Hat
1, 1he names, email address and phone numbers of over three million hotel guests.
2,Weaknesses in the platform’s security practices.
Scenario 1:
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices.
The names, email address and phone numbers of over three million hotel guests.
Day 2:
1. White hat
2. Black hat
3. Gray hat
4. Black hat
5. Gray hat
Day 2
1. White hat
2. Black hat
3. Grey hat
4. Grey hat
5. White hat
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices.
DAY 2
1. White hat
2. Black hat
3. White hat
4. Black hat
5. Gray hat
Scenario 1
The card payment information of over three million guests.
Scenario 2
Weaknesses in the platform’s security practices.
DAY 2
1. White hat
2. Black hat
3. White hat
4. Black hat
5. Gray hat
Scenario 1
The names, email address and phone numbers of over three million hotel guests.
Scenario 2
Weaknesses in the platform’s security practices.
Scenario 1:
numbers of over three million hotel guests.
3. The hotel chain’s reputation.
Scenario 2:
Extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer.
Extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer.
DAY 2 1 Gray hat 2 Black hat 3 White hat 4 Gray hat 5 White hat
scenario 1: The names, email address and phone numbers of over three million hotel guests. scenario 2: Weaknesses in the platform’s security practices.
Scenario 1: The names, email address and phone numbers of over three million hotel guests.
Scenario 2: Weaknesses in the platform’s security practices.