Discussion Assignment Cyber Security Course- What was Taken?

Scenario 1

Security breaches today are all too common, with attackers constantly finding new and innovative ways of infiltrating organizations in search of valuable information.

Scroll down to read the latest breaking security news headline.

What Happened?

According to our sources, a well known hotel chain that operates across the world has reported a massive data breach, with the personal information of over three million guests exposed to hackers.

The hotel discovered that hackers gained access to its customer database by using the login details of one of its employees.

At this point, the hotel doesn’t believe that the hackers were able to access any account passwords or financial information. Recent guests are encouraged to check the hotel chain’s web portal to see if they have been impacted by this breach.

*This is a fictional scenario.

This is a multiple choice question. Once you have selected an option, select the submit button below to submit your answer.

In this example, what did the hackers take?

Select the correct answer, then Submit.

  1. The card payment information of over three million guests.
  2. The names, email address and phone numbers of over three million hotel guests.
  3. The hotel chain’s reputation.
  4. The username and password of all of the hotel’s employees.

Scenario 2

eLearning Platforms at Risk!

The team at DEXA is concerned. eLearning platforms are becoming prime targets for attackers as more and more organizations make the move to digital learning.

SCROLL down to find out more about a recent case.*

A popular online training platform admitted leaving the personal data of millions of its students (many of them minors) exposed on a publicly accessible cloud database.

Hackers were able to directly access students’ full names, email addresses, phone numbers, and school enrollment details from the Internet!

While it’s unclear what the hackers have done with this acquired information, it’s safe to say that they have everything they need to carry out widespread phishing or malware attacks.

What Exploits?

What exploits did the hackers use in this case to gain access to valuable personal information?

Select the correct answer, then Submit.

  • Weaknesses in the platform’s security practices.
  • Extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer.
  • Bypassing the platform’s access control methods.
  • Taking advantage of student information not being correctly validated on the platform.
Discussion Assignment Cyber Security Course- What was Taken?

2,714 thoughts on “Discussion Assignment Cyber Security Course- What was Taken?

  1. SCENERIO 1. The names, email address and phone numbers of over three million hotel guest

    SCENERIO 2. Weaknesses in the platform’s security practice

    Day 2
    Answers to What Color is my hat?

    1. Gray hat

    2. Black hat

    3. Gray hat

    4. Black hat

    5. White hat

  2. The names, email address and phone numbers of over three million hotel

    Weaknesses in the platform’s security practices.

  3. PROSPER
    1. The names, email address and phone numbers of over three million hotel guest
    2. Weakness in the platform’s security practices

  4. The names, email address and phone numbers of over three million hotel guests.
    weakness in the platform’s security practices

  5. The username and password of all of the hotels’s employees
    weakness in the platform’s security practices

  6. Scenario 1
    The hotel chain’s reputation.
    Scenario 2
    Weaknesses in the platform’s security practices

  7. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.
    The hotel chain’s reputation.
    The username and password of all of the hotel’s employees.
    Scenario 2
    Weaknesses in the platform’s security practices.

  8. Scenario 1
    The names, email address and phone numbers of over three million hotel guests

    Scenario 2
    Weakness in the platform’s security practices

  9. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platform’s security practices.

  10. The username and password of all of the guests in the hotel
    weakness in the platform’s security practices

  11. 1. The names, email address and phone numbers of over three million hotel guests
    2. Weakness in the platforms memory buffer

  12. Scenario 2
    Weaknesses in the platform’s security practices.
    Extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer.
    Taking advantage of student information not being correctly validated on the platform

  13. Scenario 1
    The card payment information of over three million guests.

    The names, email address and phone numbers of over three million hotel guests.

    The hotel chain’s reputation.

  14. Team 2 : Day 2
    1. White Hat Attacker
    2. Black Hat Attacker
    3. White Hat Attacker
    4. Black Hat Attacker
    5. White Hat Attacker

  15. 1. After hacking into ATM systems remotely using a laptop, this attacker worked with the ATM manufacturers to resolve the identified security vulnerabilities.

    White hat

    2. This attacker transferred $10 million into their bank account using customer account and PIN credentials gathered from recordings.

    Black hat

    3. This attacker’s job is to identify weaknesses in a company’s computer system.

    White hat

    4. This attacker used malware to compromise a company’s system and steal credit card information that was then sold to the highest bidder.

    Black hat

    5. While carrying out some research, this attacker stumbled across a security vulnerability on an organization’s network that they are authorized to access.

    Gray Hat

  16. The card payment information of over three million guests.

    Bypassing the platform’s access control methods.

  17. Scenario 2: Weaknesses in the platform’s security practices.

    Scenario 1: The names, email address and phone numbers of over three million hotel guests.

  18. Scenario 1: The names, email address and phone numbers of over three million hotel guests.
    Scenario 2: Weaknesses in the platform’s security practices.

  19. Eunice ihemelandu
    Answer
    Scenario1 The names, email address and phone numbers of over three million hotel guests.

    Scenario 2:weakness in the platforms security practices

  20. Discussion/Assignment on
    WHAT COLOR IS MY HAT

    1.White hat
    2.Black hat
    3.White hat
    4.Black hat
    5.Grey hat

    1. The names, email address and phone numbers of over three million hotel guests.
      Weaknesses in the platform’s security practices.

  21. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Taking advantage of student information not being correctly validated on the platform.

  22. Scenario 1
    The hotel chain’s reputation

    Scenario 2
    Weaknesses in the platform’s security practices

  23. The names, email address and phone numbers of over three million hotel guest
    1 White Hat
    2 Black Hat
    3White Hat
    4 Gray Hat
    5 White Hat

  24. 1) The names, email address and phone numbers of over three million hotel guests
    2) Weaknesses in the platform’s security practices.

  25. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platform’s security practices.

  26. Scenario 1. The names, email address and phone numbers of over three million hotel guests

    Scenario 2. Taking advantage of student information not being correctly validated on the platform.

  27. Scenario 1-
    -The names, email address and phone numbers of over three million hotel guests.
    -The hotel chain’s reputation.

    Scenario 2-
    Weaknesses in the platform’s security practices

  28. Kingsley Ifeanyi Okpaleke (Team 3)

    Scenario 1 – The username and password of all of the hotel’s employees

    Scenario 2 –
    Weaknesses in the platform’s security practices

  29. Scenario 1
    The username and password of all of the hotel’s employees.

    Scenario 2
    Weaknesses in the platform’s security practices.

  30. Answer 1: The names, email address and phone numbers of over three million hotel guests.
    Answer 2: Weaknesses in the platform’s security practices.

  31. Scenario 1
    The names, email address and phone numbers of over three million hotel guests
    Scenario 2
    Taking advantage of student information not being correctly validated on the platform

  32. Scenario 1:
    The names, email addresses, and phone numbers of over three million hotel guests.

    Scenario 2:
    Weaknesses in the platform’s security practices.

  33. The names, email address and phone numbers of over three million hotel guests.

    Weaknesses in the platform’s security practices.

  34. Scenario 1
    The username and password of all of the hotel’s employees.

    The names, email address and phone numbers of over three million hotel guests.

    The card payment information of over three million guests.

    Scenario 2
    Weaknesses in the platform’s security practices.

    1. Scenario 1
      The name, email address and phone numbers of over 3million hotel guests.

      Scenario 2
      Weaknesses in the platform’s security practices.

  35. The names, email address and phone numbers of over three million hotel guests.

    Weaknesses in the platform’s security practices.

  36. The names, email address and phone numbers of over three million hotel guests
    Weaknesses in the platform’s security practices.

  37. Scenario 1
    The names, email address and phone numbers of over three million hotel guests
    Scenario 2
    Bypassing the platform’s access control methods.

  38. Scenario 1: The names, email address and phone numbers of over three million hotel guests.

    Scenario 2: Weaknesses in the platform’s security practices.

  39. Scenario 1
    The card payment information of over three million guests.
    Scenario 2
    Weaknesses in the platform’s security practices.

  40. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.
    Scenario 2
    Weaknesses in the platform’s security practices.

  41. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.
    Scenario 2
    Weaknesses in the platform’s security practices.

  42. Answers to Day 2 questions
    1. White hat
    2. Black hat
    3. White hat
    4. Black hat
    5. Gray hat

  43. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platform’s security practices.

  44. 1. White Hat Attacker
    2. Black Hat Attacker
    3. White Hat Attacker
    4. Black Hat Attacker
    5. White Hat Attacker

  45. SCENARIO 1

    The names, email address and phone numbers of over three million hotel guests

    SCENARIO 2

    Weaknesses in the platform’s security practices.

  46. Scenario 1
    The card payment information of over three million guests.

    Scenario 2
    Weaknesses in the platform’s security practices

  47. 1. Gray Hat Attacker
    2. Black Hat Attacker
    3. White Hat Attacker
    4. Black Hat Attacker
    5. White Hat Attacker

  48. Scenario 1.
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2.
    Weaknesses in the platform’s security practices.

  49. Scenario 1:
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2:
    Weaknesses in the platform’s security practices.

  50. 1. Gray Hat Attacker
    2. Black Hat Attacker
    3. White Hat Attacker
    4. Black Hat Attacker
    5. White Hat Attacker

  51. The names, email address and phone numbers of over three million hotel guests

    Weaknesses in the platform’s security practices.

  52. Scenario 1
    The names, email address and phone numbers of over three million hotel guests
    Scenario 2
    Weaknesses in the platform’s security practices.

  53. Scenario 1:The names, email address and phone numbers of over three million hotel guests.
    Scenario 2:Weaknesses in the platform’s security practices

  54. Scenario 1: The names, email address and phone numbers of over three million hotel guests.
    Scenario 2: Weaknesses in the platform’s security practices.

  55. The username and password of all of the hotel’s employees.
    Extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer.

  56. Scenario 1:The names, email address and phone numbers of over three million hotel guests.
    Scenario 2:Weaknesses in the platform’s security practices

  57. The names, email address and phone numbers of over three million hotel guests.

    Taking advantage of student information not being correctly validated on the platform.

  58. 1.The names, email address and phone numbers of over three million hotel guests.

    2.Weaknesses in the platform’s security practices

  59. Scenario 1:The names, email address and phone numbers of over three million hotel guests.
    Scenario 2:Weaknesses in the platform’s security practices.

    1. In SCENARIO 1: The names, email address and phone numbers of over three million hotel guests.
      In SCENARIO 2: Weaknesses in the platform’s security practices.

  60. Scenario 1- The names, email address and phone numbers of over three million hotel guests.
    Scenario 2- Weaknesses in the platform’s security practices.

  61. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weakness in the platform’s security practices

  62. Scenario 2: Taking advantage of student information not being correctly validated on the platform.

  63. Scenario 1 : The names, email address and phone numbers of over three million hotel guests.

    Scenario 2 : Weaknesses in the platform’s security practices.

  64. Scenario 1: The names, email address and phone numbers of over three million hotel guests.

    Scenario 2: Weaknesses in the platform’s security practices.

  65. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.
    Scenario 2
    Bypassing the platform’s access control methods.

  66. 1. The username and password of all of the hotel’s employees.
    2. Weaknesses in the platform’s security practices

  67. 1. The names, email address and phone numbers of over three million hotel guests.
    2. Weaknesses in the platform’s security practices

  68. Scenario 1.
    2. The names, email address and phone numbers of over three million hotel guests.

    Scenario 2.
    Weaknesses in the platform’s security practices.

  69. The card payment information of over three million guests.
    Weaknesses in the platform’s security practices.

  70. 1. The names, email address and phone numbers of over three million hotel guests.
    2. Weaknesses in the platform’s security practices.

  71. 1. The names, email address and phone numbers of over three million hotel guests.
    2.Weaknesses in the platform’s security practices.

  72. 1] The names, email address and phone numbers of over three million hotel guests.

    2]Weaknesses in the platform’s security practices.

  73. The names, email address and phone numbers of over three million hotel guests.
    Weaknesses in the platform’s security practices.

  74. The names, email address and phone numbers of over three million hotel guests.
    Weaknesses in the platform’s security practices

  75. The card payment information of over three million guests.

    Weaknesses in the platform’s security practices

  76. The username and password of all of the hotel’s employees.

    Taking advantage of student information not being correctly validated on the platform.

  77. 1) The card payment information of over three million guests
    B) The hotel chain’s reputation

    2) weakness in the platform’s security practices

  78. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.
    Scenario 2
    Weaknesses in the platform’s security practices.
    Reply

  79. Scenario 1
    The names, email address and  phone numbers of over three million hotel guests.
    Scenario 2
    Weaknesses in the platform’s security practices.

  80. scenario 1
    The names, email address and phone number of over three million hotel guest
    Scenario 2
    weakness in the platform’s security practices

  81. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Bypassing the platform’s access control methods.

  82. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.
    Scenario 2
    Weaknesses in the platform’s security practices.

  83. senario 1
    The hotel chain’s reputation

    Senario 2
    Weaknesses in the platform’s security practices.

  84. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.
    Scenario 2
    Weaknesses in the platform’s security practices.

    Reply

  85. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platform’s security practices.

  86. The card payment information of over three million guests.
    The names, email address and phone numbers of over three million hotel guests.
    Bypassing the platform’s access control methods.
    Weaknesses in the platform’s security practices.

  87. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.
    Scenario 2
    Weaknesses in the platform’s security practices.

  88. Scenerio 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platform’s security practices.

  89. The card payment information of over three million guests.

    The names, email address and phone numbers of over three million hotel guests.

    The hotel chain’s reputation.

  90. 1.The names, email address and phone numbers of over three million hotel guests.
    2.Weaknesses in the platform’s security practices

  91. Weaknesses in the platform’s security practices
    Taking advantage of student information not being correctly validated on the platform

  92. 1. The names, email address and phone numbers of over three million hotel guests.
    2. Taking advantage of student information not being correctly validated on the platform.

  93. The names, email address and  phone numbers of over three million hotel guests.The hotel chain’s reputation.

    Weaknesses in the platform’s security practices.

  94. SCENARIO 1: Gray hat
    SCENARIO 2: Black hat
    SCENARIO 3: White hat
    SCENARIO 4: Black hat
    SCENARIO 5: White hat

  95. Scenario 1 – The names, email address and phone numbers of over three million hotel guests.
    Scenario2- Taking advantage of student information not being correctly validated on the platform.

  96. Scenario 1 – The names, email address and phone numbers of over three million hotel guests.

    Scenario2- Taking advantage of student information not being correctly validated on the platform.

  97. SCENARIO 1: Gray hat
    SCENARIO 2: Black hat
    SCENARIO 3: White hat
    SCENARIO 4: Black hat
    SCENARIO 5: White hat

  98. Scenario 1: Gray hat
    Scenario 2: Black hat
    Scenario 3: White hat
    Scenario 4: Black hat
    Scenario 5: White hat

  99. Scenario 1: The names, email and phone numbers of over three million guests
    Scenario 2: Weakness in the platform security platform

  100. SCENARIO 1: Gray hat
    SCENARIO 2: Black hat
    SCENARIO 3: White hat
    SCENARIO 4: Black hat
    SCENARIO 5: White hat

  101. 1.The names, email address and phone numbers of over three million hotel guests.
    2.Weaknesses in the platform’s security practices.

  102. Scenario1:The names, email address and phone numbers of over three million hotel guests.
    Scenario 2:Weaknesses in the platform’s security practices.

  103. Scenario 1:
    The names, email address and phone numbers of over three million hotel guests.
    Scenario 2:
    Taking advantage of student information not being correctly validated on the platform.

  104. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2

    Taking advantage of students information not correctly validated on the platform

  105. Scenario 1: The names email and phone numbers of over three million guests.
    Scenario 2: Weaknesses in the platform’s security practices.

  106. In scenario 1–
    The names, email address and phone numbers of over three million hotel guests.

    In Scenario 2– Weaknesses in the platform’s security practices
    —Bypassing the platform’s access control methods

  107. In scenario 1: The Hackers took
    – the names, email address and phone numbers of over three million hotel guests.
    In scenario 2: Weaknesses in the platform’s security practices.

  108. Scenario 1:The names, email address and  phone numbers of over three million hotel guests.
    Scenario 2: Weaknesses in the platform’s security practices.

  109. The card payment information of over three million guests.
    The names, email address and phone numbers of over three million hotel guests.

  110. Weaknesses in the platform’s security practices.
    Bypassing the platform’s access control methods.

  111. scenario 1: The names, email address and phone numbers of over three million hotel guests.
    scenario 2: Weaknesses in the platform’s security practices.

  112. SCENERIO 1

    2. The Names, Email Address and Phone numbers of over 3 million hotel guests
    3. The hotel chains reputation

    SCENERIO 2

    Weaknesses in the platform’s security practices

    Taking advantage of student information not being correctly validated on the platform

  113. Scenario 1
    The names, email address and phone numbers of over three million hotel guests
    Scenario 2
    Weaknesses in the platform’s security practices.

  114. Scenario 1:
    The hotel chain’s reputation.
    Scenario 2;
    Weaknesses in the platform’s access control methods

  115. Scenario 1:
    The hotel chain’s reputation.
    Scenario 2:
    Weaknesses in the platform’s security practices

  116. SCENERIO 1- The names, email address and phone numbers of over three million hotel guests.
    SCENERIO 2- Weaknesses in the platform’s security practices.

  117. SCENARIO 1 : The names, email address and phone numbers of over three million hotel guests.

    SCENARIO 2: Weaknesses in the platform’s security practices.

  118. Scenario 1:
    1. The hotel chains reputation.

    Scenario 2:
    1. On the weaknesses in the platform’s security practices
    2. Taking advantage of student’s information not being correctly validated on the platform.

    1. SCENARIO 1 : The names, email address and phone numbers of over three million hotel guests.

      SCENARIO 2: Weaknesses in the platform’s security practices.

  119. In Scenario 1 : The hackers took
    1. The names, email address and phone numbers of all three million hotel guest.
    2. The hotel chains reputation.

    While in Scenario 2: The hackers exploited
    1. On the weaknesses in the platform’s security practices
    2. Taking advantage of student’s information not being correctly validated on the platform.

  120. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platform’s security practices.

  121. Scenario 1: The hotel chain’s reputation.
    Scenario 2: Weaknesses in the platform’s security practice.

  122. Scenario I
    The names,email addresses and phone numbers of over three million hotel guests
    Scenario 2
    Taking advantage of student information not being correctly validated on the platform.

  123. Scenario 1
    The names, email addresses and phone numbers of over three million hotel guests

    Scenario-2
    Taking advantage of student information not being correctly validated on the platform.

    1. 1) The names, email address and phone numbers of over three million hotel guests.
      2)Weaknesses in the platform’s security practices.

  124. Scenario 1
    The names, email addresses and phone numbers of over three million hotel guests

    Scenario 2
    Weaknesses in the platform’s security practices.

  125. The card payment information of over three million guests.
    The names, email address and phone numbers of over three million hotel guests.
    The hotel chain’s reputation.

    SENARIO 2

    Weaknesses in the platform’s security practices.

  126. SCENARION 1
    The hackers took the names, email address and phone numbers because their personal information was exposed which the hotel confirmed.

    SCENARIO 2
    Weaknesses in the platform’s security practices because leaving a cloud database publicly accessible is a major security misconfiguration.

    Thanks

  127. SCENARION 1
    The hackers took the names, email address and phone numbers of over three million hotel guests because their personal information were exposed.

    SCENARION 2

  128. The names, email addresses and phone numbers of over three million hotel guests
    Extracting information when the volume of student data exceeds the storage capacity of the platforms memory buffer

  129. Extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer.

  130. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2

    Weaknesses in the platform’s security practices.

  131. The names, email address and phone numbers of over three million hotel guests.
    Weaknesses in the platform’s security practices.

  132. Scenario 1: The username and password of all of the hotel’s employees.
    Scenario 2: Weaknesses in the platform’s security practices.

  133. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.
    Scenario 2
    Weaknesses in the platform’s security practices.

  134. 1. The hotel chain’s reputation.
    2. Weaknesses in the platform’s security practices.

  135. 1
    The names, email address and phone numbers of over three million hotel guests.
    2
    Weaknesses in the platform’s security practices

  136. Senerio 1
    The username and password of all of the hotel’s employees.

    Senerio 2
    Weaknesses in the platform’s security practices

    Taking advantage of student information not being correctly validated on the platform

  137. Scenerio 1
    2. The Names, Email Address and Phone numbers of over 3 million hotel guests
    3. The hotel chains reputation

    Scenerio 2
    Weaknesses in the platform’s security practices

    Taking advantage of student information not being correctly validated on the platform

  138. what color is my hat Answer
    1. Gray hat attackers
    2. Black hat attackers
    3.Gray hat attackers
    4. Black attackers
    5. white hat attackers

  139. scenerio 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenrio 2
    Weaknesses in the platform’s security practices.

  140. 2. The names, email address and phone numbers of over three million hotel guests.
    Weaknesses in the platform’s security practices.

  141. Scenario 1
    1. The names, email address and phone numbers of over three million hotel guests.
    2. Weaknesses in the platform’s security practices

    1. Scenario 1: The names, email address and phone numbers of over three million hotel guests.
      Scenario 2:Weaknesses in the platform’s security practices.

  142. DAY 2
    1. White hat hackers
    2. black hat hackers
    3. gray hat hackers
    4. black hat hackers
    5. white hat hackers

  143. 1. The names, email address and phone numbers of over three million hotel guests
    2. Weaknesses in the platform’s security practices

  144. Answers to what colors is my hat
    1. white hat hacker
    2. Black hat hacker
    3. Gray hat hacker
    4. Black hat hacker
    5. White hat hacker

  145. Day 2 discussion answer
    1. Gray hat hackers
    2. Black hat hackers
    3. White hat hackers
    4. Gray hat hackers
    5. Black hat hackers

  146. Scenario 1: The hotel chain’s reputation.

    Scenario 2: Weaknesses in the platform’s security practices.

  147. .Extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer.

  148. Scenario 1. The names, email addresses, and phone numbers of over three million hotel guests.
    Scenario 2. Weaknesses in the platform’s security practices.

    1. Scenario 1: The names, email addresses, and phone numbers of over three million hotel guests.

      Scenario 2: Weakness in the platform’s security practices.

  149. DAY 1
    1. The hotel chain’s reputation
    2. Weaknesses in the platform’s security practices.

    DAY 2
    1. White hat
    2. Black hat
    3. White hat
    4. Gray hat
    5. White hat

  150. The names, email address and phone numbers of over three million hotel guests.
    Weaknesses in the platform’s security practices.

  151. Scenario 1
    The card payment information of over three million guests.
    The names, email address and phone numbers of over three million hotel guests.
    The hotel chain’s reputation.

    Scenario 2
    Bypassing the platform’s access control methods

  152. BigZion72
    Day1
    Scenerio 1: The names, email address and phone numbers of over three million hotel guests.
    Scenerio 2: Weaknesses in the platform’s security practices.

  153. Scenario 1:
    The names, email address and phone numbers of over three million hotel guests.
    Scenario 2:
    Weaknesses in the platform’s security practices.

      1. Scenario 1: The card payment information of over three million guests.

        Scenario 2:Weaknesses in the platform’s security practices.

  154. Scenario 1
    They took the names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platform’s security practices.

  155. Scenario 1
    Ans: The names , email address and phone number of over 3 million guests
    Scenario 2
    And: Weaknesses in the platform security practices

    1. Q1: the name email address and phone number of over three million guests
      Q2: weaknesses in the platform security practices

  156. Scenario 1: The names, email address and phone numbers of over three million hotel guests.

    ‎Scenario 2: Weaknesses in the platform’s security practices.

  157. Day 1

    Scenario 1

    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2

    Weaknesses in the platform’s security practices.

  158. Scenario 1

    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2

    Weaknesses in the platform’s security practices.

  159. Scenario 1: The names, email address and phone numbers of over three million hotel guests.
    Scenario 2: Weaknesses in the platform’s security practices.

  160. ITEM OLUWATOYIN COMFORT
    Day 1
    Assessment question 1:
    The names, email address and phone numbers of over three million hotel guests

  161. Senerio 1
    The card payment information of over three million guests.
    Senerio 2
    Weaknesses in the platform’s security practices.

  162. 1. The card payment information of over three million guests.

    2. Weaknesses in the platform’s security practices.

  163. Senerio 2

    1. Weaknesses in the platform’s security practices.
    2. Bypassing the platform’s access control methods.
    3. Taking advantage of student information not being correctly validated on the platform.

  164. Senerio 1
    1. The card payment information of over three million guests.
    2. The names, email address and phone numbers of over three million hotel guests.
    3. The hotel chain’s reputation.

  165. Scenario 1: The names, email and address and phone numbers of over three million hotel guest
    Scenario 2: weaknesses in the platform’s security practices.

  166. Scenario 1:The names, email address and phone numbers of over three million hotel guests.
    Scenario 2:Weaknesses in the platform’s security practices.

  167. Scenario 1: The names, email address and phone numbers of over three million hotel guests.

    Scenario 2: Weaknesses in the platform’s security practices.

  168. SCENERIO 1-The names, email address and phone numbers of over three million hotel guests.
    SCENERIO 2-Weaknesses in the platform’s security practices.

  169. Scenario 1: The names, email address and phone numbers of over three million hotel guests.

    Scenario 2: Weaknesses in the platform’s security practices.

  170. Scenario 1
    The username and password of all of the hotel’s employees

    Scenario 2 Weaknesses in the platform’s security practices

  171. SCENARIO 1; The names, email and address and phone numbers of over three million hotel guests.
    SCENARIO 2; Weakness in the platform’s security practices.

  172. SCENARIO 1; The names, email address and phone numbers of over three million hotel guest

    SCENARIO 2; Weaknesses in the platform’s security practices.

  173. Scenario 1: The names, email address and phone numbers of over three million hotel guests.

    Scenario 2: Weaknesses in the platform’s security practices.

  174. Scenario 1: The names email address and phone numbers of over three million hotel guests
    Scenario 2: Weakness in the the platform security practices

  175. Scenario 1: The names, email address and phone numbers of over three million hotel guests.
    The hotel chain’s reputation.

    Scenario 2:Weaknesses in the platform’s security practices.

  176. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.
    Scenario 2
    Weaknesses in the platform’s security practices.

  177. Scenario 1: The names, email address and phone numbers of over three million hotel guests.
    Scenario 2:Weaknesses in the platform’s security practices.

    1. Scenario 1
      The names, email address and phone numbers of over three million hotel guests.
      Scenario 2
      Weaknesses in the platform’s security practices.

  178. Scenario 1: The names, email address and phone numbers of over three million hotel guests.
    Scenario 2: Weaknesses in the platform’s security practices.

  179. Scenario 1 Answer: The names, email address and phone numbers of over three million hotel guests.

    Scenario 2 Answer: Weaknesses in the platform’s security practices.

  180. 1. The names, email address and phone numbers of over three million hotel guests.
    2. Weaknesses in the platform’s security practices.

  181. 1. The card payment information of over three million guests.
    2. Bypassing the platform’s access control methods.

  182. Answers;
    Scenario 1: The names, email address and phone numbers of over three million hotel guests.

    Scenario 2: Weaknesses in the platform’s security practices.

  183. Scenerio 1-The names, email address and phone numbers of over three million hotel guests.
    Scenerio 2-Weaknesses in the platform’s security practices.

  184. Scenario 1: The names, email address and phone numbers of over three million hotel guests.

    Scenario 2:
    Weaknesses in the platform’s security practices

  185. SCENERIO 1; The names, email address and phone numbers of over three million hotel guests.

    The hotel chain’s reputation.

    SCENERIO 2;Weaknesses in the platform’s security practices.

  186. The hotel chain’s reputation
    Extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer.

  187. SCENERIO 1; The names, email address and phone numbers of over three million hotel guests.

    The hotel chain’s reputation.

    SCENERIO 2;Weaknesses in the platform’s security practices.

  188. Scenario 1: The names, email address and phone numbers of over three million hotel guests
    Scenario 2: Weaknesses in the platform’s security practices.

  189. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platform’s security practices.

  190. The card payment information of over three million guests.
    Misconfigured cloud database or lack of proper access

  191. Answers
    Q1. The card payment information of over three million guests.
    Q2. Weaknesses in the platform’s security practices

  192. Answers
    Q1. The card payment information of over three million guests.
    Q2. Weaknesses in the platform’s security practices

  193. 1.The names, email address and phone numbers of over three million hotel guests
    2.Weaknesses in the platform’s security practices.

  194. 1 scenario -:The names, email address and phone numbers of over three million hotel guests.

    2:Weaknesses in the platform’s security practices.

  195. `1. The names, email address and phone numbers of over three million hotel guests.
    The hotel chain’s reputation.

    2. Weaknesses in the platform’s security practices.

  196. The card payment information of over three million guests.

    Weaknesses in the platform’s security practices.

  197. 1. The names, email address and phone numbers of over three million hotel guests.
    2. Weaknesses in the platform’s security practices.

  198. Scenario 1:
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2:
    Weaknesses in the platform’s security practices.

  199. Scenario one: The names, email address and phone numbers of over three million hotel guests.

    Scenario two: Weaknesses in the platform’s security practices.

  200. 1: The names, email address and phone numbers of over three million hotel guests.

    2:Weaknesses in the platform’s security practices.

  201. scenerio 1
    The names, email address and phone numbers of over three million hotel guests

    Scenerio 2
    Weaknesses in the platform’s security practices

  202. 1. The names, email address and phone numbers of over three million hotel guests.

    2. Weaknesses in the platform’s security practices.

  203. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platform’s security practices.

  204. Scenario 1:The username and password of all of the hotel’s employees.

    Scenario 2: Weaknesses in the platform’s security practices.

  205. Scenario one:The card payment information of over three million guests
    Scenario two:Weaknesses in the platform’s security practices

  206. Augustine Anuoluwapo
    Scenario 1
    The card payment information of over three million guests.
    Scenario 2
    Weaknesses in the platform’s security practices.

  207. Scenario 1
    The card payment information of over three million guests.

    Scenario 2
    Weaknesses in the platform’s security practices.

  208. Scenario 1 Answer: The names, email address and phone numbers of over three million hotel guests.

    Scenario 2 Answer: Weaknesses in the platform’s security practices

  209. 1.The card payment information of over three million guests.
    2.Weaknesses in the platform’s security practices.

  210. Scenario 1: The names, email address and phone numbers of over three million hotel guests.
    Scenario 2:Weaknesses in the platform’s security practices

  211. Scenario 1: a) The names, email addresses and phone numbers of over 300million guests.

    b) The hotel chains reputation

    Scenario 2: Weaknesses in the platforms security practices.

  212. Scenario 1: The names, email address and phone numbers of over three million hotel guests.
    Scenario 2:Weaknesses in the platform’s security practices.

  213. Scenario 1: The names, email address and phone numbers of over three million hotel guests.
    Scenario 2: Weaknesses in the platform’s security practices.

  214. Extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer.

  215. senario 1; The username and password of all of the hotel’s employees.

    senario 2; Weaknesses in the platform’s security practices.

  216. Ouestion 1: The names, email address and phone numbers of over three million hotel guests.

    Question 2: Weaknesses in the platform’s security practices.

    1. scenario1. The names, email address and phone numbers of over three million hotel guests.
      scenario2. weakness in the platform’s security practices.

  217. 1. The names, email addresses, and phone numbers of over three million hotel guests.
    2. Weaknesses in the platform’s security practices.

  218. The names, email address and phone numbers of over three million hotel guests.

    Weaknesses in the platform’s security practices

  219. 1. The names, email addresses, and phone numbers of over three million hotel guests.
    2. Weaknesses in the platform’s security practices.

  220. Ouestion 1: The names, email address and phone numbers of over three million hotel guests.

    Question 2: Weaknesses in the platform’s security practices.

  221. Ouestion 1: The names, email address and phone numbers of over three million hotel guests.

    Question 2: Weaknesses in the platform’s security practices.

  222. Day 2,
    Question 1: Grey hat
    Question 2: Black hat
    Question 3: White hat
    Question 4: Black hat
    Question 5: White hat

  223. Question 1: The username and password of all of the hotel’s employees.

    Question 2:Weaknesses in the platform’s security practices.

  224. Question 1: The names, email address and phone numbers of over three million hotel guests

    Question 2: Weaknesses in the platform’s security practices.

  225. Extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer.

  226. Taking advantage of student information not being correctly validated on the platform.
    The names, email address and phone numbers of over three million hotel guests

  227. The first answer is the names,email address and phone number of over three million hotel guests.

    Scenario number 2 is weakness in the platform’s security practices.

  228. The names, email address and phone numbers of over three million hotel guests.
    2.
    Weaknesses in the platform’s security practices.

  229. Scenario 1.
    The card payment information of over three million guests.
    Scenario 2.
    Weaknesses in the platform’s security practices.

  230. (1). The names, email address and phone numbers of over three million hotel guests.

    (2). Weakness in the platforms practices.

  231. 1. The names, email address and phone numbers of over three million hotel guests.

    2. Weaknesses in the platform’s security practices.

  232. 1. The names, email address and phone numbers of over three million hotel guests.
    2. Weaknesses in the platforms security practices.

  233. 1. The names, email address and phone numbers of over three million hotel guests.
    2. Weaknesses in the platform’s security practices.

  234. Scenario 1 : The card payment information of over three million guests

    Scenario 2: weakness in the platform’s security practices

  235. Scenario 1.
    The names, email addresses and phone numbers of over 3 million hotel guests .
    Scenario 2.
    Weaknesses in the platform’s security practices.

  236. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.
    Scenario 2
    Weaknesses in the platform’s security practices.

  237. Scénario 1
    Les noms, adresses e-mail et numéros de téléphone de plus de trois millions de clients d’hôtels.
    Scénario 2
    Faiblesses dans les pratiques de sécurité de la plateforme.

  238. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platform’s security practices.

  239. Scenario 1 The names, email address and phone numbers of over three million hotel guests.
    Scenario 2 Extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer.

  240. 1. The names, email address and phone numbers of over three million hotel guests.

    2. Taking advantage of student information not being correctly validated on the platform.

  241. Scenario 1. The names, email address and phone numbers of over three million hotel guests.

    Scenario 2. Weaknesses in the platform’s security practices.

  242. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platform’s security practices.

  243. Scenario 1

    2. The names, email address and phone numbers of over three million hotel guests.

    Scenario 2

    Taking advantage of student information not being correctly validated on the platform.

  244. The names, email address and phone numbers of over three million hotel guests. The names, email address and phone numbers of over three million hotel guests

  245. The names, email address and phone numbers of over three million hotel guests and the hotel chains reputation

    Weaknesses in the platforms security practices

  246. The names, email address and phone numbers of over three million hotel guests

    Weaknesses in the platform’s security practices.

  247. Scenario 1
    The username and Password of all the hotel’s employees

    Scenario 2
    Weaknesses in the platform’s security practices

  248. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.
    Scenario 2
    Taking advantage of student information not being correctly validated on the platform

  249. (23/11/2024)
    Day 2: cohort 8 Assessment answers
    Cyber Attackers

    1.Gray hat
    2.Black hat
    3.White hat
    4.Black hat
    5. White hat

  250. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Taking advantage of student information not being correctly validated on the platform.

  251. The names, email address and phone numbers of over three million hotel guests.

    Weaknesses in the platform’s security practices.

  252. Scenerio 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenerio 2
    Weaknesses in the platform’s security practices.

  253. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platform’s security practices.

  254. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Taking advantage of student information not being correctly validated on the platform

  255. Scenario 1:
    The names, email addresses, and phone numbers of over three million hotel guests.
    Scenario 2:
    Weaknesses in the platform’s security practices.

    1. Day 2
      1. Gray hat attacker
      2.Black hat attacker
      3. White hat attacker
      4.Black hat attacker
      5. White hat attacker

  256. Scenario 1:
    The names, email address and phone numbers of over three million hotel guests.
    Scenario 2:
    Weaknesses in the platform’s security practices.

  257. Scenario 1
    1. The card payment information of over three million guests.
    Scenario 2
    2. Extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer.

  258. Scenario 1 The names, email address and phone numbers of over three million hotel guests.
    Scenario 2 Extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer.

  259. Scenario 1.
    The names, email address and phone numbers of over three million hotel guests.
    Scenario 2
    Weaknesses in the platform’s security practices.

  260. Scenario 1:
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2:
    Taking advantage of student information not being correctly validated on the platform.

  261. Scenario 1
    The names, email address and phone numbers of over three million hotel guests

    Scenario 2
    Weaknesses in the platform’s security practices.

  262. 1. The names, email address and phone numbers of over three million hotel guests.
    2. Weaknesses in the platform’s security practice

  263. Weaknesses in the platform’s security practices. For senerio 2

    The username and password of all of the hotel’s employees. For senerio 1

  264. *Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Taking advantage of student information not being correctly validated on the platform.

  265. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer.

  266. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platform’s security practices.

  267. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer.

  268. Scenario 1 The names, email address and phone numbers of over three million hotel guests.
    Scenario 2 Weaknesses in the platform’s security practices.

  269. Scenario 1 answer
    The card payment information of over three million guests.
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2 answer
    Extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer.

    1. Scenario number 1 is the names,email address and phone number of over three million hotel guests.

      Scenario number 2 is weakness in the platform’s security practices.

  270. Scenario 1:
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2:
    Weaknesses in the platform’s security practices.

  271. Scenario 1:
    The names, email address and phone numbers of over three million hotel guests

    Scenario 2:
    Weaknesses in the platform’s security practices.

  272. 1.The names, email address and phone numbers of over three million hotel guests

    2.Weaknesses in the platform’s security practices.

  273. 1. The names, email address and phone numbers of over three million hotel guests.

    2 Taking advantage of student information not being correctly validated on the platform.

  274. Scenerio 1: The names, email address and phone numbers of over three million hotel guests.

    Scenerio 2: Weaknesses in the platform’s security practices.

  275. 1. The names, email address and phone numbers of over three million hotel guests.
    2.Weaknesses in the platform’s security practices.

  276. 1. The names, email address and phone numbers of over three million hotel guests.
    2. Weaknesses in the platform’s security practices.

  277. Scenerio 1: The names, email address and phone numbers of over three million hotel guests.

    Scenerio 2: Weaknesses in the platform’s security practices.

  278. Scenario 1
    Answer: The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Answer: Weaknesses in the platform’s security practices.

  279. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platform’s security practices.

  280. Scenario 1: The card payment information of over three million guests.
    Scenario 2: Weaknesses in the platform’s security practices.

  281. Scenario 1-The names, email address and phone numbers of over three million hotel guests.

    Scenario 2-Weaknesses in the platform’s security practices.

  282. Scenario 1: The names, email address and phone numbers of over three million hotel guests.

    Scenario 2: Weaknesses in the platform’s security practices.
     

  283. Scenario 1: The names, email address and phone numbers of over three million hotel guests.
    Scenario 2: Weaknesses in the platform’s security practices.

  284. Case 1 _ The names, email address and phone numbers of over three million hotel guests.

    Case 2 _ weaknesses in the platform’s security practices

  285. * The names, email address and phone numbers of over three million hotel guests.

    *Weaknesses in the platform’s security practices.

  286. Scenario 1: The names, email address and phone numbers of over three million hotel guests.

    Scenario 2: Weaknesses in the platform’s security practices

  287. Scenario 1 The username and password of all of the hotel’s employees.
    Scenario 2 Weaknesses in the platform’s security practices.

  288. Senerio 1- the names, email address and phone numbers of over 3 million hotel guests

    Senerio 2- weakness in the platforms security practices

  289. Scenerio 1: The names, email address and phone numbers of over three million hotel guests

    Scenario 2: Weaknesses in the platform’s security practices.

  290. Scenario 1: The names, email address and phone numbers of over three million hotel guests

    Scenario 2: Weaknesses in the platform’s security practices.

  291. SCENARIO 1: The names, email addresses, and phone numbers of over three million hotel guests
    SCENARIO 2: Weaknesses in the platform’s security practices.

  292. The names, email address and phone numbers of over three million hotel guests.
    Weaknesses in the platform’s security practices.

  293. Scenario 1: The names, email address and phone numbers of over three million hotel guests.
    Scenario 2: Weaknesses in the platform’s security practices.

  294. SCENERIO 1: The names, email address and phone numbers of over three million hotel guests
    SCENERIO 2: Weaknesses in the platform’s security practices.

  295. SCENARIO 1: The names, email addresses and phone numbers of over three million hotel guests

    SCENARIO 2: Weaknesses in the platform’s security practices.

  296. SCENERIO 1: The names, email address and phone numbers of over three million hotel guests.

    SCENERIO 2: Weaknesses in the platform’s security practices.

  297. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.
    Scenario 2

    Weaknesses in the platform’s security practices.

  298. Scenario 1
    .The hotel chain’s reputation.
    Scenery 2
    Extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer.

  299. The names, email address and phone numbers of over three million hotel guests.

    Weaknesses in the platform’s security practices.

  300. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platform’s security practices.

  301. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platform’s security practices.
    Bypassing the platform’s access control methods

  302. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.
    Scenario 2
    Weaknesses in the platform’s security practices.

  303. 1a. The names, email, address and phone number of over 3 million guest
    B. Hotel chains reputation.
    2. Weakness in the platforms security practices

  304. 1. The names, email addresses, and phone numbers of over three million hotel guests.
    2. Weaknesses in the platform’s security practices.

  305. 1.) The card payment information of over three million guests.
    2.) Weaknesses in the platform’s security practices.

  306. 1.The names, email address and phone numbers of over three million hotel guests.
    2.Weakness in the platforms security practice

  307. 1.The names, email address and phone numbers of over three million hotel guests.
    2. Weaknesses in the platform’s security practices.

  308. 1. The names, email address and phone numbers of over three million hotel guests.
    2. Weaknesses in the platform’s security practices.

  309. 1. The names, email address and phone numbers of over three million hotel guests.

    2. Weaknesses in the platform’s security practices.

  310. 1. The names, email address and phone numbers of over three million hotel guests.
    2. Weaknesses in the platform’s security practices.

  311. 1. The names, email address and phone numbers of over three million hotel guests
    2.Taking advantage of student information not being correctly v

  312. 1. The names, email address and phone numbers of over three million hotel guests
    2.Taking advantage of student information not being correctly validated on the platform.

  313. The names, email address and phone numbers of over three million hotel guests.
    Taking advantage of student information not being correctly validated on the platform.

  314. 1. The names, email address and phone numbers of over three million hotel guests.
    2. Weaknesses in the platform’s security practices.

  315. Question 1
    The names, email address and phone numbers of over three million hotel guests.
    Question 2
    Weaknesses in the platform’s security practices.

  316. Question 1. The username and password of all of the hotel’s employees.
    Question 2. Weaknesses in the platform’s security practices.

  317. Question 1. The names, email address and phone numbers o

    Question 2. Weaknesses in the platform’s security practices.

  318. The names, email address and phone numbers of over three million hotel guests.

    Weaknesses in the platform’s security practices.

  319. The names, email address and phone numbers of over three million hotel guests.

    Weaknesses in the platform’s security practices.

  320. The names, email address and phone numbers of over three million hotel guests.

    Weaknesses in the platform’s security practices.

  321. The names, email address and phone numbers of over three million hotel guests.

    Bypassing the platform’s access control methods

  322. The names, email address and phone numbers of over three million hotel guests.
    Weaknesses in the platform’s security practices.

  323. The card payment information of over three million guests.

    Weaknesses in the platform’s security practices.

    White hat
    Black hat
    White hat
    Black hat
    Grey/White hat

  324. The card payment information of over three million guests.

    Weaknesses in the platform’s security practices.

  325. SCENARIO 1
    The names, email address and phone numbers of over three million hotel guests.

    SCENARIO 2
    Weaknesses in the platform’s security practices.

  326. SCENARIO 1
    The names, email address and phone numbers of over three million hotel guests.
    SCENARIO 2
    Weaknesses in the platform’s security practices.

  327. The card payment information of over three million guests.

    Weaknesses in the platform’s security practices.

    1. Scenario 1
      Weaknesses in the platform’s security practices.
      Scenario 2
      The names, email address and phone numbers of over three million hotel guests.

  328. Extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer.

  329. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.
    Scenario 2
    Weaknesses in the platform’s security practices.

  330. 1. Weaknesses in the platform’s security practices.
    2.The card payment information of over three million guests.

  331. 1.Weaknesses in the platform’s security practices.

    2.The card payment information of over three million guests.

  332. Scenario 1: The names, email addresses and phone numbers of over three million hotel guests.

    Scenario 2: Taking advantage of students information not being correctly validated on the platform.

  333. Scenario 1: The names, email address and phone numbers of over three million hotel guests
    Scenario 2: Taking advantage of student information not being correctly validated on the platform.

  334. The hotel chain’s reputation.

    memory buffer.

    Taking advantage of student information not being correctly validated on the platform.

  335. The names, email address and phone numbers of over three million hotel guests.
    Weaknesses in the platform’s security practices

  336. The names, email address and phone numbers of over three million hotel guests.

    Weaknesses in the platform’s security practices

  337. The names, email address and phone numbers of over three million hotel guests.

    Weaknesses in the platform’s security practices.

  338. The names, email address and phone numbers of over three million hotel guests.

    Weaknesses in the platform’s security practices.

  339. The names, email address and phone numbers of over three million hotel guests.

    Weaknesses in the platform’s security practices

  340. 1. The names, email address and phone numbers of over three million hotel guests.

    2. Weaknesses in the platform’s security practices.

  341. 1. The names, email address and phone numbers of over three million hotel guests.
    2. Weaknesses in the platform’s security practices.

  342. The names, email address and phone numbers of over three million hotel guests.
    Weaknesses in the platform’s security practices.

  343. The names, email address and phone numbers of over three million hotel guests
    Weaknesses in the platform’s security practices.

  344. Scenario 1

    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2

    Weaknesses in the platform’s security practices.

  345. 1.The name,email address and phone number of over 3 million guest
    2.Weaknesses in the platform’s security practices.

  346. The names, email address and phone numbers of over three million hotel guests.
    2.weaknessess in the platform’s security practices

  347. 1. The names, email address and phone numbers of over three million hotel guests.
    2.weaknessess in the platform’s security practices

  348. Scenario 1 ;The names, email address and phone numbers of over three million hotel guests.

    Scenario 2 ;Weaknesses in the platform’s security practices.

  349. Scenario 1

    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2

    Weaknesses in the platform’s security practices.

  350. Extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer.

  351. Scenario One;
    The names, email address and phone numbers of over three million hotel guests.

    Scenario Two;
    Weaknesses in the platform’s security practices.

  352. Day 1
    The card payment information of over three million guests.

    Weaknesses in the platform’s security practices.

  353. Scenario 1
    It’s safe to say they took:
    The card payment information of over three million guests.

     

    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platform’s security practices

  354. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    The hotel chain’s reputation.
    Scenario 2
    Weaknesses in the platform’s security practices.

  355. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platform’s security practices.

  356. Day 1
    scenario 1
    The names, email address and phone numbers of over three million hotel guests.
    The hotel chain’s reputation.

    Scenario 2
    Weaknesses in the platform’s security practices.
    Bypassing the platform’s access control methods.

  357. day 1
    scenario 1.
    2. the names, email address and phone numbers of over three million guests
    scenario 2.
    weaknesses in the platform’s security practices

  358. DAY 2
    Answers to today’s questions
    1. After hacking into ATM systems remotely using a laptop, this attacker worked with the ATM manufacturers to resolve the identified security vulnerabilities.
    Ans-White hat

    2. This attacker transferred $10 million into their bank account using customer account and PIN credentials gathered from recordings.
    Ans-Black hat

    3. This attacker’s job is to identify weaknesses in a company’s computer system.
    Ans-White hat

    4. This attacker used malware to compromise a company’s system and steal credit card information that was then sold to the highest bidder.
    Ans-Black hat

    5. While carrying out some research, this attacker stumbled across a security vulnerability on an organization’s network that they are authorized to access.
    Ans-White hat

  359. Day 2 answers:
    . After hacking into ATM systems remotely using a laptop, this attacker worked with the ATM manufacturers to resolve the identified security vulnerabilities.

    White hat

    This attacker transferred $10 million into their bank account using customer account and PIN credentials gathered from recordings.

    Black hat

    This attacker’s job is to identify weaknesses in a company’s computer system.

    White hat

    This attacker used malware to compromise a company’s system and steal credit card information that was then sold to the highest bidder.

    Gray hat

    While carrying out some research, this attacker stumbled across a security vulnerability on an organization’s network that they are authorized to access.

    White hat

  360. Scenario 1 :
    The username and password of all of the hotel’s employees.
    Scenario 2:
    Weaknesses in the platform’s security practices.

  361. Scenario 1 :

    The username and password of all of the hotel’s employees.

    Scenario 2:
    Weaknesses in the platform’s security practices.

  362. Scenario 1 – The names, email address and phone numbers of over three million hotel guests.

    Scenario 2 – Weaknesses in the platform’s security practices.

  363. Scenario 1.
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platform’s security practices.

  364. scenario 1 The names, email address and phone numbers of over three million hotel guests.
    Scenario 2, Taking advantage of student information not being correctly validated on the platform

  365. Scenario 2
    Weaknesses in the platform’s security practices.
    Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

  366. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.
    Scenario 2
    Weaknesses in the platform’s security practices.

  367. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.
    Scenario 2
    Weaknesses in the platform’s security practices.

  368. Scenario 1
    The card payment information of over three million guests.
    Scenario 2

    Bypassing the platform’s access control methods.

  369. Scenario 1
    The card payment information of over three million guests.
    Scenario 2
    Weaknesses in the platform’s security practices

  370. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.
    Scenario 2
    Weaknesses in the platform’s security practices

  371. Scenario 1: The names, email addresses and phone numbers of over three million hotel guests
    Scenario 2: Weaknesses in the platform’s security practices

  372. Scenario One: The names, email addresses and phone numbers of over three million hotel guests
    Scenario two: Weaknesses in the platform’s security practices

  373. Extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer

  374. Scene 2
    Extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer.

  375. The card payment information of over three million guests.

    The names, email address and phone numbers of over three million hotel guests.

    The hotel chain’s reputation.
    The username and password of all of the hotel’s employees.

  376. Scenario 2:
    1. Weaknesses in the platform’s security practices.
    2. Extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer.
    3. Bypassing the platform’s access control

  377. Scenario 1: The names, email address and phone numbers of over three million hotel guests.

    The hotel chain’s reputation.
    The username and password of all of the hotel’s employees.

  378. 1.The names, email address and phone numbers of over three million hotel guests.

    2. Weaknesses in the platform’s security practices.

  379. In the first scenario: The hotel chain’s reputation.
    In the second scenario: Weaknesses in the platform’s security practices.

    1. Scenario 1:
      The names, email address and phone numbers of over three million hotel guests.

      Scenario 2:
      Weaknesses in the platform’s security practices.

  380. In the first scenario, The names, email address and phone numbers of over three million hotel guests.
    The second scenario is Weaknesses in the platform’s security practices.

  381. Scenario 1: The names, email address and phone numbers of over three million hotel guests.
    Scenario 2: Bypassing the platform’s access control methods.

  382. Scenario 1: The names, email address and phone numbers of over three million hotel guests.

    Scenario 2: Weaknesses in the platform’s security practices.

  383. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platform’s security practices.

  384. SCENARIO 1: The names, email addresses, and phone numbers of over three million hotel guests
    SCENARIO 2:Weaknesses in the platform’s security practices

  385. Scenario 1: The username and password of all of the hotel’s employees.

    Scenario 2: Weaknesses in the platform’s security practices.

  386. The names, email address and phone numbers of over three million hotel guests
    Weaknesses in the platform’s security practices.

  387. 1. The names, email address and phone numbers of over three million hotel guest
    2. Weaknesses in the platform’s security practices

  388. SCENARIO 1- The names, email address and phone numbers of over three million hotel guests
    SCENARIO 2- Weaknesses in the platform’s security practices.

  389. 1. The names, email address and phone numbers of over three million hotel guests.
    2. Weaknesses in the platform’s security practices.

  390. SCENARIO 1 – Over three million hotel guests’ names, email addresses, and phone numbers.

    SCENARIO 2 – Weaknesses in the platform’s security practices.

  391. SCENARIO 1 – The names, email address and phone numbers of over three million hotel guests.

    SCENARIO 2 – Weaknesses in the platform’s security practices.

  392. Scene 1 The names, email address and phone numbers of over three million hotel guests.
    Scene 2 Weaknesses in the platform’s security practices.

  393. Scene 1:
    The names, email address and phone numbers of over three million hotel guests

    Scene 2:
    Weaknesses in the platform’s security practices.

  394. 1). The names, email address and phone numbers of over three million hotel guests.

    2). Weakness in the platform’s security practices.

  395. Scenario 1:
    2. The names, email address and phone numbers of over three million hotel guests.

    Scenario 2:
    Weaknesses in the platform’s security practices.

  396. Scenario 1. The username and password of all of the hotel’s employees.

    Scenario 2Weaknesses in the platform’s security practices.

  397. Scenario 1
    The names,  email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platform’s security practices.

  398. Scenario 1

    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2

    Weaknesses in the platform’s security practices.

  399. Scenario 1:
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2:
    Weaknesses in the platform’s security practices.

  400. SCENERIO 1
    2. The names, email address and phone numbers of over three million hotel guests

    SCENERIO 2
    Weaknesses in the platform’s security practices.

  401. 1. The names, email address and phone numbers of over three million hotel guests.

    2. Weaknesses in the platform’s security practices.

  402. 1.The names, email address and phone numbers of over three million hotel guests.

    2.Weaknesses in the platform’s security practices.

  403. Scenario 1
    The card payment information of over three million guests.
    The names, email address and phone numbers of over three million hotel guests.
    The hotel chain’s reputation.

    Scenario 2
    Weaknesses in the platform’s security practices

  404. Scenario 1.

    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2

    Weaknesses in the platform’s security practices.

  405. Scenario 1: The names, email address and phone numbers of over three million hotel guests.
    Scenario 2: Weaknesses in the platform’s security practices.

  406. Scenario 1: The names, email addresses, and phone numbers of over three million hotel guests.

    Scenario 2: Weaknesses in the platform’s security practices.

  407. 1. The names, email address and phone numbers of over three million hotel guests.
    2. Weaknesses in the platform’s security practices.

  408. Ofoche Stanley cohort 7 team 5
    Scenario 1: The names, email address and phone numbers of over three million hotel guests.
    Scenario 2: Weaknesses in the platform’s security practices.

  409. Scenario 1. The card payment information of over three million guests.
    Scenario 2. Weaknesses in the platform’s security practices.

  410. scenario 1: The names, email address and phone numbers of over three million hotel guests.

    scenario 2: Weaknesses in the platform’s security practices.

  411. Correction to scenario 2:
    The correct answer is-
    weaknesses in the platforms security practices
    Since they admitted leaving all the student information on a publicly accessible cloud service.

  412. Prisca Ifediba Alachebe- Team 3
    Scenario 1- answer is The names, email address and phone numbers of over three million hotel guests.

    Since the hotel is sure that the financial information of the clients are not affected.

    Scenario 2. Answer-
    Taking advantage of student information not being correctly validated on the platform.

    Since the majority of hacked accounts are minors, they might not have properly validated their account details, therefore exposing them to hack attacks.

  413. The card payment information of over three million guests.

    Weaknesses in the platform’s security practices.

    Taking advantage of student information not being correctly validated on the platform.

  414. 1)The names, email address and phone numbers of over three million hotel guests.
    2)Weaknesses in the platform’s security practices.

  415. 1. The names, email address and phone numbers of over three million hotel guests.

    2. Weaknesses in the platforms security practices

  416. 1st scenario: The names, email address and phone numbers of over three million hotel guests.

    2nd Scenario: Weaknesses in the platform’s security practices.

  417. 1. The names, email address and phone numbers of over three million hotel guests.
    2. Weaknesses in the platform’s security practices.

  418. 1. The names, email address and phone numbers of over three million hotel guests.
    2. Weaknesses in the platform’s security practices.

  419. Scenario 1
    Ans. 2.The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Ans. Weaknesses in the platform’s security practices.

  420. Senario 1
    The names, email address and phone numbers of over three million hotel guests.
    Senario 2
    Weaknesses in the platform’s security practices.

  421. Senario 1
    The names, email address and phone numbers of over three million hotel guests.
    Senario 2
    Weaknesses in the platform’s security practices.

  422. The card payment information of over three million guests.
    The names, email address and phone numbers of over three million hotel guests.
    The hotel chain’s reputation

  423. 1. The names, email address and phone numbers of over three million hotel guests.

    2. Weaknesses in the platform’s security practices

  424. Day 1
    Scenario 1

    The names, email address and phone numbers of over three

    Scenario 2

    Weaknesses in the platform’s security practices

  425. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platforms security practices.

  426. Scenario 1

    The username and password of all of the hotel’s employees.

    Scenario 2

    Weaknesses in the platform’s security practices.

  427. 1, 1he names, email address and phone numbers of over three million hotel guests.

    2,Weaknesses in the platform’s security practices.

  428. Scenario 1:
    The names, email address and phone numbers of over three million hotel guests.
    Scenario 2
    Weaknesses in the platform’s security practices.

  429. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platform’s security practices.

  430. Scenario 1
    The card payment information of over three million guests.
    Scenario 2
    Weaknesses in the platform’s security practices.

  431. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.
    Scenario 2
    Weaknesses in the platform’s security practices.

  432. Scenario 1:
    numbers of over three million hotel guests.
    3. The hotel chain’s reputation.
    Scenario 2:
    Extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer.
    Extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer.

  433. scenario 1: The names, email address and phone numbers of over three million hotel guests. scenario 2: Weaknesses in the platform’s security practices.

  434. Scenario 1: The names, email address and phone numbers of over three million hotel guests.

    Scenario 2: Weaknesses in the platform’s security practices.

  435. DAY 1
    Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platform’s security practices.

  436. Day 1
    Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platform’s security practices.

  437. Scenario 1

    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2

    Weaknesses in the platform’s security practices.

  438. Scenario 1
    The hackers took the hotel chain’s reputation.
    Scenario 2
    The hackers exploited the weaknesses in the platform’s security practices.

  439. Scenario 1: The names, email address and phone numbers of over three million hotel guests.

    Scenario 2: Taking advantage of student information not being correctly validated on the platform.

  440. Scenario 1-The names, email address and phone numbers of over three million hotel guests.

    Scenario 2-Weaknesses in the platform’s security practices.

    1. Scenario 1-The names, email address and phone numbers of over three million hotel guests.

      Scenario 2-Weaknesses in the platform’s security practices

  441. The names,  email address and phone numbers of over three million hotel guests.

    Taking advantage of student information not being correctly validated on the platform.

  442. The names, email address and phone numbers of over three million hotel guests.

    Weaknesses in the platform’s security practices.

  443. Scenario 1

    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2

    Weaknesses in the platform’s security practices.

  444. Scenario 1
    1.The names, email address and phone numbers of over three million hotel guests

    Scenario 2
    2. Weaknesses in the platform’s security practices.

  445. Senario 1
    The names, email address and phone numbers of over three million hotel guests.
    Senario 2
    Weaknesses in the platform’s security practices.

  446. Scenerio1
    The names, email address and phone numbers of over three million hotel guests.
    Scenerio2
    Weaknesses in the platform’s security practices.

  447. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platform’s security practices.

  448. 1. The names, email address and phone numbers of over three million hotel guests.
    2 Weaknesses in the platform’s security practices.

  449. scenario 1
    The names, email address and phone numbers of over three million hotel guests.
    Scenario 2
    Weaknesses in the platform’s security practices.

  450. 1. The names, email address and phone numbers of over three million hotel guests

    2. Weaknesses in the platform’s security practices.

  451. 1.The names, email address and phone numbers of over three million hotel guests.
    2.Weaknesses in the platform’s security practices.

  452. Scenario 1 answer: The names, email address and phone numbers of over three million hotel guests.

    Scenario 2 answer: Weaknesses in the platform’s security practices.

  453. The names, email address and phone numbers of over three million hotel guests
    Weaknesses in the platform’s security practices.

  454. The names, email address and phone numbers of over three million hotel guests.

    Weaknesses in the platform’s security practices.

  455. 1.The names, email address and phone numbers of over three million hotel guests.
    2.Weaknesses in the platform’s security practices.

  456. The names, email address and phone numbers of over three million hotel guests.

    Weaknesses in the platform’s security practices

  457. Scenario 1
    The card payment information of over three million guests.

    Scenario 2
    Weaknesses in the platform’s security practices.

  458. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platform’s security practices.

  459. 1. The names, email address and phone numbers of over three million hotel guests.

     2. Weaknesses in the platform’s security practices.

  460. CHRISTOPHER CHINEDU NWIKE

    Scenario 1
    The names, email addresses, and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platform’s security practices.

  461. Scenario 1
    The card payment information of over three million guests.

    The names, email address and phone numbers of over three million hotel guests.

    The hotel chain’s reputation.

    Scenario 2
    Weaknesses in the platform’s security practices.

  462. Scenario 1

    The card payment information of over three million guests

    Scenario 2
    Weaknesses in the platform’s security practices.

  463. The names, email address and phone numbers of oveer three million guests.

    Weaknesses in the platform’s security practices.

  464. Cisco’s ISR 4000 provides routing, filtering and encryption in a single platform.
    1. Router

    Cisco’s Firepower 4100 Series shows what’s happening on the network so that you can act faster in the face of a cyber attack
    2. Firewall

    Cisco’s AnyConnect Secure Mobility Client empowers remote workers with highly secure access to @Αpollo’s network from any device, at any time, in any location.
    3. VPN

    Cisco’s AMP provides next-generation endpoint protection, scanning and constantly monitoring files for malicious behavior
    4. Antimalware

  465. The names, email address and phone numbers of over three million hotel guest.

    weakness in the platforms security practices.

  466. Scenero 1. The names, email address and phone numbers of over three million hotel guests.

    Scenero 2. Weaknesses in the platform’s security practices.

  467. 1) The names, email address and phone numbers of over three million hotel guests.
    2) Weaknesses in the platform’s security practices.

  468. Scenario 1: The names, email address and phone numbers of over three million hotel guests.
    Scenario 2: Bypassing the platform’s access control methods

  469. 1. The names, email address and phone numbers of over three million hotel guests.
    2. Weaknesses in the platform’s security practices.

  470. Scenerio 1 Answer: The names, email address and phone numbers of over three million hotel guests.
    Scenerio 2 Answer: Weaknesses in the platform’s security practices.

  471. Scenario 1
    The card payment information of over three million guests.

    Scenario 2
    Weaknesses in the platform’s security practices.

  472. scenario 1
    The card payment information of over three million guests.

    scenario 2
    Weaknesses in the platform’s security practices.

  473. First scenario:
    The hotel chain’s reputation

    Second scenario:
    Weaknesses in the platform’s security practices.

  474. For the first scenario, the hackers took The names, email address and phone numbers of over three million hotel guests.

  475. 1. After hacking into ATM systems remotely using a laptop, this attacker worked with the ATM manufacturers to resolve the identified security vulnerabilities.
    • White hat
    2. This attacker transferred $10 million into their bank account using customer account and PIN credentials gathered from recordings.
    • Black hat
    3. This attacker’s job is to identify weaknesses in a company’s computer system.
    Please select an option
    • Gray hat
    • Black hat
    • White hat

    4. This attacker used malware to compromise a company’s system and steal credit card information that was then sold to the highest bidder.
    • Black hat
    5. While carrying out some research, this attacker stumbled across a security vulnerability on an organization’s network that they are authorized to access.
    • White hat

  476. The names, email address and phone numbers of over three million hotel guests.
    Weaknesses in the platform’s security practices.

  477. Scenario 1: The names, email address and phone numbers of over three million hotel guests.

    Scenario 2: Weaknesses in the platform’s security practices.

  478. Scenario 1: The names, email address and phone numbers of over three million hotel guests.

    Scenario 2: Weaknesses in the platform’s security practices.

  479. The names, email address and phone numbers of over three million hotel guests
    Weaknesses in the platform’s security practices.

  480. The names, email address and phone numbers of over three million hotel guests.

    Weaknesses in the platform’s security practices

  481. 1. Gray hat
    2. Black hat
    3. White hat
    4. black hat
    5. White hat
    Scenario I
    The card payment information of over three million guests.
    Scenario 2
    Weaknesses in the platform’s security practices.

  482. SCENERIO 1
    The hotels reputation
    the card payment information of over 3 million guests

    SCENERIO 2
    Extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer.
    Taking advantage of student information not being correctly validated on the platform.

  483. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platform’s security practices.

  484. The hotel chain’s reputation.The hotel chain’s reputation.

    Weaknesses in the platform’s security practices.

  485. Scenrio 1

    The names, email address and phone numbers of over three million hotel guests

    Scenerio 2

    Weaknesses in the platform’s security practices.

  486. The names, email address and phone numbers of over three million hotel guests.

    Weaknesses in the platform’s security practices.

  487. Scenario 1

    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2

    Extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer.

  488. 1.
    The names, email address and phone numbers of over three million hotel guests.
    Scenario 2.
    Extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer.

  489. The card payment information of over three million guests.
    Weaknesses in the platform’s security practices.

  490. The names, email address and phone numbers of over three million hotel guests.

    Weaknesses in the platform’s security practices.

  491. Scenario 1:The names,email and phone numbers of over three million hotel guests
    Scenario 2: weakness in the platform’s security services

  492. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.
    Scenario 2
    Weaknesses in the platform’s security practices.

  493. Scenario I
    The names, email address and phone numbers of over three million hotel guests.
    Scenario 2
    Weaknesses in the platform’s security practices.

  494. 1. The names, email address and phone numbers of over three million hotel guests.

    2. Weaknesses in the platform’s security practices

  495. The card payment information of over three million guests.
    Taking advantage of student information not being correctly validated on the platform.

  496. 1. After hacking into ATM systems remotely using a laptop, this attacker worked with the ATM manufacturers to resolve the identified security vulnerabilities.
    *Gray hat

    2. This attacker transferred $10 million into their bank account using customer account and PIN credentials gathered from recordings.
    *Black hat

    3. This attacker’s job is to identify weaknesses in a company’s computer system.
    *White hat

    4. This attacker used malware to compromise a company’s system and steal credit card information that was then sold to the highest bidder.
    *Black hat

    5. While carrying out some research, this attacker stumbled across a security vulnerability on an organization’s network that they are authorized to access.
    *White hat

  497. 1. After hacking into ATM systems remotely using a laptop, this attacker worked with the ATM manufacturers to resolve the identified security vulnerabilities.

    White hat

    2. This attacker transferred $10 million into their bank account using customer account and PIN credentials gathered from recordings.

    Black hat

    3. This attacker’s job is to identify weaknesses in a company’s computer system.

    Gray hat

    4. This attacker used malware to compromise a company’s system and steal credit card information that was then sold to the highest bidder.

    Black hat

    5. While carrying out some research, this attacker stumbled across a security vulnerability on an organization’s network that they are authorized to access.

    White hat

  498. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.
    Scenario 2
    Weaknesses in the platform’s security practices.

  499. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2.
    Weaknesses in the platform’s security practices.

  500. 1. After hacking into ATM systems remotely using a laptop, this attacker worked with the ATM manufacturers to resolve the identified security vulnerabilities.

    Answer: White

    2. This attacker transferred $10 million into their bank account using customer account and PIN credentials gathered from recordings.

    Answer: Black

    3. This attacker’s job is to identify weaknesses in a company’s computer system.

    Answer: White

    4. This attacker used malware to compromise a company’s system and steal credit card information that was then sold to the highest bidder.

    Answer: Black

    5. While carrying out some research, this attacker stumbled across a security vulnerability on an organization’s network that they are authorized to access.

    Answer: White

  501. Scenario 1. The names, email address and phone numbers of over three million hotel guests.

    Scenario 2. Weaknesses in the platform’s security practices.

  502. Scenario 1: The names, email address and phone numbers of over three million hotel guests.

    Scenario 2: Weaknesses in the platform’s security practices

  503. scenario1.The names, email address and phone numbers of over three million hotel guests..
    secnario2.Weaknesses in the platform’s security practices.

  504. SCENERIO 1
    The names, email address and phone numbers of over three million hotel guests.

    SCENRIO 2
    Extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer.

  505. SCENARIO 1
    The card payment information of over three million guests.

    SCENARIO 2
    Weaknesses in the platform’s security practices.

  506. SCENARIO 1
    The names, email address and phone numbers of over three million hotel guests.

    SCENARIO 2
    Weaknesses in the platform’s security practices.

  507. SCENARIO 1
    Taking advantage of student information not being correctly validated on the platform.

    SCENARIO 2
    Weaknesses in the platform’s security practices.

  508. Scenario 1: The names, email address and phone numbers of over three million hotel guests.
    Scenario 2: Weaknesses in the platform’s security practices.

  509. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platform’s security practices.

  510. Scenerio 1. The names, email address and phone numbers of over three million hotel guests.

    Scenerio 2. Weaknesses in the platform’s security practices.

  511. The names, email address and phone numbers of over three million hotel guests
    Weaknesses in the platform’s security practices

  512. Scenario 1”
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platform’s security practices.

  513. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.
    Scenario 2
    Weakness in the platform’s security practices.

  514. Answer 1
    The names, email address and phone numbers of over three million hotel guests.
    Answer 2
    Weaknesses in the platform’s security practices.

  515. Scenario 1
    The names , email address and phone numbers of over three million hotel guests .

    Scenario 2
    Weakness in the platform’s security practices

  516. Scenario 1..
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2….
    Weaknesses in the platform’s security practices.

  517. Scenerio 1
    The names, email address and phone numbers of over three million hotel guests.
    Scenario 2
    Weaknesses in the platform’s security practices.

  518. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.
    Scenario 2
    Weaknesses in the platform’s security practices.

  519. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.
    Scenario 2
    Weaknesses in the platform’s security practices.

  520. Scenerio 1:The names, email address and phone numbers of over three million hotel guests

    Scenerio 2: Weakness in the platform’s security practices

  521. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenerio 2
    Weaknesses in the platform’s security practices.

  522. Scenario 1:The names, email address and phone numbers of over three million hotel guests.

    Scenario 2:
    Weaknesses in the platform’s security practices.

  523. Scenario 1: The names, email address and phone numbers of over three million hotel guests.

    Scenario 2: Weaknesses in the platform’s security practices.

  524. Scenario 1: The names, email address and phone numbers of over three million hotel guests.

    Scenario 2: Weaknesses in the platform’s security practices.

  525. No 1.The names, email address and phone numbers of over three million hotel guests.

    No 2.Weaknesses in the platform’s security practices.

  526. The names, email address and phone numbers of over three million hotel guests.

    Weaknesses in the platform’s security practices.

  527. Scenario 1: The names, email address and phone numbers of over three million hotel guests. But ultimately, the reputation of the hotel chain has been compromised because both affected and none affected customers will find it difficult trusting them to keep their personal informations safe.
    Scenario 2: Weaknesses in the platform’s security practices.

  528. First Scenario: The card payment information of over three million guests.

    Second Scenario: Weaknesses in the platform’s security practices.

  529. 1st Scenario-The names, email address and phone numbers of over three million hotel guests.

    2nd Scenario-Weaknesses in the platform’s security practices.

  530. Scenario 1: The names, email address and phone numbers of over three million hotel guests.

    Scenario 2: Taking advantage of student information not being correctly validated on the platform.

  531. 1st Scenario – The hotel chain’s reputation

    2nd Scenario – Weaknesses in the platform’s security practices.

  532. Scenario 1: The hotel chain’s reputation

    Scenario 2: Bypassing the platform’s access control methods.

  533. 1. White Hat
    2. Black Hat
    3. White Hat
    4. Gray Hat
    5. White hate

    Internal
    invite malware onto the organization’s network by clicking on malicious emails or websites

    External
    use social engineering to gain unauthorized access to organizational data.

  534. For scenario 1:
    The card payment information of over three million guests.
    The names, email address and phone numbers of over three million hotel guests.

    The hotel chain’s reputation.

    Scenario 2:
    Weaknesses in the platform’s security practices.

  535. Scenario 1
    The card payment information of over three million guests.
    The names, email address and phone numbers of over three million hotel guests.
    The hotel chain’s reputation.

    Scenario 2
    Weaknesses in the platform’s security practices.

    Bypassing the platform’s access control methods.

  536. SCENARIO 1
    The card payment information of over three million guests.
    The names, email address and phone numbers of over three million hotel guests.
    The hotel chain’s reputation.

    SCENARIO 2
    Weaknesses in the platform’s security practices.
    Bypassing the platform’s access control methods.

  537. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.
    The hotel chains reputation
    Scenario 2
    Weaknesses in the platform’s security practices.

  538. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platform’s security practices.

  539. The names, email address and phone numbers of over three million hotel guests
    Weaknesses in the platform’s security practices.

  540. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platform’s security practices.

  541. First Scenario

    The names, email address and phone numbers of over three million hotel guests.

    Second Scenario

    Weaknesses in the platform’s security practices.

  542. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.
    Scenario 2
    Weaknesses in the platform’s security practices

  543. Scenario1:
    The hotel chain’s reputation.so the hackers have access to there personal information.

    Scenario2:
    The username and password of all of the hotel’s employee.

  544. Scenrio 1:
    The names, email address and phone numbers of over three million hotel guests.

    Scenrio 2:
    Weaknesses in the platform’s security practices.

  545. Scenario1.
    The hotel chain’s reputation.so the hackers have access to there personal information.
    Scenario2.
    The username and password of all of the hotel’s employee.

  546. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.
    Scenario 2
    Weaknesses in the platform’s security practices

  547. Scenario 2
    Extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer.

  548. For senecio 1
    The card payment information of over three million guests.
    For secenrio 2
    Taking advantage of student information not being correctly validated on the platform.

  549. for scenerio 1
    The card payment information of over three million guests

    for scenerio two
    Weaknesses in the platform’s security practices.

  550. The names, email address and phone numbers of over three million hotel guests.
    Weaknesses in the platform’s security practices.

  551. The names, email address and phone numbers of over three million hotel guests. The names, email address and phone numbers of over three million hotel guests.

  552. for scenerio 1
    The card payment information of over three million guests

    for scenerio two
    Weaknesses in the platform’s security practices.

  553. For scenario 1,
    The names, email address and phone numbers of over three million hotel guests

    For scenario 2,
    Weaknesses in the platform’s security practices.

  554. Answer to scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Answer to scenario 2
    Weaknesses in the platform’s security practices.

  555. 1.The card payment information of over three million guests.
    2.The names, email address and phone numbers of over three million hotel guests.

  556. 1.The names, email address and phone numbers of over three million hotel guests

    Scenerio 2
    Taking advantage of student information not being correctly validated on the platform.
    Related

  557. Scenario 1 – The names, email addresses and phone numbers of over three million hotel guests

    Scenario 2 – Weaknesses in the platform’s security practices.

  558. Scenario 1 – The names, email address and phone numbers of over three million hotel guests

    Scenario 2 – Weaknesses in the platform’s security practices.

  559. Symptoms of Malware:-

    modified or deleted files
    the presence of unknown files, programs or desktop icons
    unknown processes running
    programs turning off or reconfiguring themselves

  560. The names, email address and phone numbers of over three million hotel guests.
    Extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer.

  561. You’ve logged into your laptop but it contains some photos belonging to the previous user, who no longer works at DEXA Your line manager asks you to delete them. You drag the photos into the recycle bin, open the recycle bin, select them and click ‘Delete’ once again. That should do it!

    Do you think the photos are really gone from the laptop?

    Select the correct answer, then Submit.

    ❌ Yes, the photos can no longer be retrieved.
    ✅ No, the photos are just inaccessible from the operating system.
    Think about it? What’s your answer?
    My answer is option B. No, the photos are just inaccessible from the operating system.

  562. Scenario 1: The names, email address and phone numbers of over three million hotel guests.

    Scenario 2: Weaknesses in the platform’s security practices.

  563. 1. White Hat
    2. Black Hat
    3. Gray Hat
    4. Black Hat
    5. Gray Hat

    Internal
    invite malware onto the organization’s network by clicking on malicious emails or websites

    External
    use social engineering to gain unauthorized access to organizational data.

  564. Scenerio 1
    The names, email address and phone numbers of over three million hotel guests.
    Scenerio 2
    Weaknesses in the platform’s security practices.

  565. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.
    Scenario 2
    Weaknesses in the platform’s security practices.

  566. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.
    Scenario 2
    Weaknesses in the platform’s security practices.

  567. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platform’s security practices.

  568. 1. The card payment information of over three million guests.
    2. The names, email address and phone numbers of over three million hotel guests.
    3. The hotel chain’s reputation.
    The username and password of all of the hotel’s employees

    1. Weaknesses in the platform’s security practice
    2. Bypassing the platform’s access control methods.
    3. Taking advantage of student information not being correctly validated on the platform

  569. OGE CHINWEZE
    TEAM 5
    Scenario 1
    Ans – The username and password of all of the hotel’s employees.

    Scenario 2
    Ans – Weaknesses in the platform’s security practices.

  570. Questions on Cyber Attackers Section
    1. Gray hat
    2. Black hat
    3. White hat
    4. Black hat
    5. White hat

  571. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platform’s security practices.

  572. The username and password of all of the hotel’s employees.

    Weaknesses in the platform’s security practices.

  573. JESUDIMU OPEYEMI
    TEAM 4
    COHORT 5

    Scenario 1
    The hotel chain’s reputation.
    The fact that the hacker was able to penetrate or access the customer’s details there was no record of whether the hacker targeted any customers but for the hacker to gain access, it affected the chain reputation of the hotel. Customers will not be able to trust the hotel with their information so therefore it will affect them.

    Scenario 2

    Weaknesses in the platform’s security practices

    The hacker was able to access the student’s information by going through the vulnerabilities of the most weakened security practices. This can be informed of a compromised user’s details or their details are not gathered not through encrypted means. so the weakness in the security practices was used to access the student’s information.

  574. For scenario 1:
    Ans: The names, email address and phone numbers of over three million hotel guests

    For scenario 2:
    Ans: Weaknesses in the platform’s security practices.

  575. Scenario 1 answer
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2 answer
    . Weaknesses in the platform’s security practices.

  576. * The card payment information of over three million guests.

    * Weaknesses in the platform’s security practices.

  577. (1) The names, email address and phone numbers of over three million hotel guests.

    (2) Bypassing the platform’s access control methods.

  578. Onibokun Adetona Oluwaseun. Team 1
    (1)The names, email address and phone numbers of over three million hotel guests.

  579. 1. After hacking into ATM systems remotely using a laptop, this attacker worked with the ATM manufacturers to resolve the identified security vulnerabilities.

    Gray hat

    2. This attacker transferred $10 million into their bank account using customer account and PIN credentials gathered from recordings.

    Black hat

    3. This attacker’s job is to identify weaknesses in a company’s computer system.

    White hat

    4. This attacker used malware to compromise a company’s system and steal credit card information that was then sold to the highest bidder.

    Black hat

    5. While carrying out some research, this attacker stumbled across a security vulnerability on an organization’s network that they are authorized to access.

    Gray hat

  580. 1. The names, email address and phone numbers of over three million hotel guests.
    2. Weaknesses in the platform’s security practices.

  581. 1. After hacking into ATM systems remotely using a laptop, this attacker worked with the ATM manufacturers to resolve the identified security vulnerabilities.

    Please select an option
    Gray hat

  582. 1. The names, email address and phone numbers of over three million hotel guests
    2. Weaknesses in the platform’s security practices.

  583. ADAOBI OBI
    Answers:
    1. The names, email address and phone numbers of over three million hotel guests
    2. Weaknesses in the platform’s security practices.

    I am also considering – Extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer.

  584. Assignment on cyber security hackers
    Question 1
    The username and password of all of the hotel’s employees.

    Question 2

    Weaknesses in the platform’s security practices.

  585. Assignment on Cyber Attackers
    Question 1
    Gray hat
    Question 2
    Black hat
    Question 3
    White hat
    Question 4
    Black hat
    Question 5
    White hat

  586. Assignment 2
    Question 1 – GRAY HAT
    Question 2- BLACK HAT
    Question 3 – WHITE HAT
    Question 4 – BLACK HAT
    Question 5 – GRAY HAT

  587. On Cyber attackers
    The answers.
    1. White hat (option 3)
    2. Black hat (option 2)
    3. Gray hat (option 1 )
    4. Gray hat (option 1 )
    5. White hat ( option 3 )

  588. Scenario 1
    Answer:The names,email address and phone numbers of over three million hotel guests.

    Scenario 2
    Answer:Weaknesses in the platform’s security practices.

  589. Scenario 1
    The hotel chain’s reputation.

    Scenario 2
    Weaknesses in the platform’s security practices.

  590. Scenario 1.
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2.

    Weaknesses in the platform’s security practices.

  591. Scenario 1
    The hotel chain’s reputation
    Scenario 2
    Weaknesses in the platform’s security practices

  592. scenario 1
    The hotel chain’s reputation.

    scenario 2
    Weaknesses in the platform’s security practices.

  593. Scenario 1: The names, email address and phone numbers of over three million hotel guests.
    Scenario 2: Weakness in the platforms security services

  594. Scenerio 1
    The names, email address and phone numbers of over three million hotel guests

    Scenerio 2
    Weakness in the platform security practices

  595. Scenario 1: The names, email address, and phone numbers of over three million hotel guests.
    Scenario 2: Weaknesses in the platform’s security practices.

  596. Scenario 1 hotel’s chain reputation scenario 2 weakness in the platform’s security system

  597. Scenario 1: The names, email address and phone numbers of over three million hotel guests.
    Scenario 2: Weakness in the platforms security services

  598. First scenario
    The names, email address and phone numbers of over three million hotel guests.

    Second scenario
    Weaknesses in the platform’s security practices.

  599. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platform’s security practices.

  600. Scenario 1: The names, email address and phone numbers of over three million hotel guests.
    Scenario 2: Weaknesses in the platform’s security practices.

  601. Scenario 1: The names, email address and phone numbers of over three million hotel guests.

    Scenario 2: Weaknesses in the platform’s security practices.

  602. Scenario 1 -T he names, email address and phone numbers of over three million hotel guests.

    Scenario 2 – Weaknesses in the platform’s security practices.

  603. Scenario 1: The names, email addresses, and phone numbers of over three million hotel guests.

    Scenario 2: Weaknesses in the platform’s security practices.

  604. Scenario 1:
    Answer: The names, email address and phone numbers of over three million hotel guests.
    Scenario 2:
    Answer: Weaknesses in the platform’s security practices.

    1. Scenario 1 company reputation Scenario 2 weakness in the platform’s security practice

  605. 1. The names, email address and phone numbers of over three million hotel guests
    2. Weaknesses in the platform’s security practices.

  606. Question 1:
    The names, email address and phone numbers of over three million hotel guests.

    Question 2:
    Weaknesses in the platform’s security practices.

  607. First Scenerio,
    I believe that what the hackers went for in the first scenerio was, The names, email address and phone numbers of over three million hotel guests.

    Second scenerio
    My answer to it is, Weaknesses in the platform’s security practices.

  608. First Scenerio

    I think the hacker basically went for The names email address and phone numbers of 3 million hotel guests…

    Second Scenerio

    Weaknesses in the platform’s security practices.

  609. senario 1

    The names, email address and phone numbers of over three million hotel guests.

    senario 2

    Weaknesses in the platform’s security practices

  610. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platform’s security practices.

  611. The names, email address and phone numbers of over three million hotel guests.

  612. Scenario 1
    The names, email address and phone numbers of over three million hotel guests
    Scenario 2
    Weaknesses in the platform’s security practices.

  613. Answer to the first senerio:-No 2. The names, email address and phone numbers of over three million hotel guests.

    Answer to the Second senerio:- No 1.

  614. 1. The names, email address and phone numbers of over three million hotel guests.
    2. Weaknesses in the platform’s security practices.

  615. Answer to senario 1

    The names, email address and phone numbers of over three million hotel guests.

    Answer to senario 2

    Weaknesses in the platform’s security practices

  616. Scenario 1
    The hotel chain’s reputation.
    Scenario 2
    Taking advantage of student information not being correctly validated on the platform.

  617. 1. The names, email address and phone numbers of over three million hotel guests.
    2. Weaknesses in the platform’s security practices.

  618. Scenario 1
    The hotel chain’s reputation.
    Scenario 2
    Bypassing the platform’s access control methods.

  619. The card payment information of over three million guests.

    The username and password of all of the hotel’s employees.

  620. Scnario A: The names, email address and phone numbers of over three million hotel guests.

    Scearo B: Weaknesses in the platform’s security practices.

  621. Scenario 1:
    The hotel chain’s reputation.
    Scenario 2:
    Weaknesses in the platform’s security practices.

  622. Scenario 1
    The card payment information of over three million guests.

    Scenario 2
    Weaknesses in the platform’s security practices.

  623. Scenario 1; The names, email address and phone numbers of over three million hotel guests.

    Scenario 2; Weaknesses in the platform’s security practices.

  624. Scenario 1. The names, email address and phone numbers of over three million hotel guests.

    Scenario 2. Weaknesses in the platform’s security practices.

  625. IdiwoguUjunwa
    Scenario 1:
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2:
    Weaknesses in the platform’s security practices.

  626. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.
    Scenario 2
    Weaknesses in the platform’s security practices

  627. The names, email address and phone numbers of over three million hotel guests
    Weaknesses in the platform’s security practices.

  628. The names,email address and phone numbers of over three million hotel guests.
    The names, email address and phone numbers of over three million hotel guests.

  629. Scenario 1
    The names, email address and phone numbers of over three million hotel guests
    Scenario 2: Weaknesses in the platform’s security practices.

  630. 1) The names, email address and phone numbers of over three million hotel guests.

    2)Weaknesses in the platform’s security practices.

  631. Scenario 1: The names, email address and phone numbers of over three million hotel guests.

    Scenario 2: Weaknesses in the platform’s security practices.

  632. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platform’s security practices.

  633. Scenario 1
    The hotel chain’s reputation

    Scenario 2
    Weaknesses in the platform’s security practices

  634. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platform’s security practices.

  635. Weaknesses in the platform’s security practices.
    The names, email address and phone numbers of over three million hotel guests

  636. scenario 1: The names, email address and phone numbers of over three million hotel guests.
    scenario 2: Weaknesses in the platform’s security practices.

  637. Paul Nweke

    Scenario 1: The names, email address and phone numbers of over three million hotel guests.

    Scenario 2: Weaknesses in the platform’s security practices.

  638. Scenario 1. The hotel chain’s reputation.

    Scenario 2. Weaknesses in the platform’s security practices.

  639. Scenario 1
    The card payment information of over three million guests.
    Scenario 2
    Weaknesses in the platform’s security practices.

  640. I honestly cannot understand why you’d ever want to run IPv6 internal I have IPv4 and IPv6 to my router Internally everything is IPv4 Nothing is routable unless I want it to be IPv4 is so much easier to remember, reason about, and router internally

  641. The names, email address and phone numbers of over three million hotel guests

    Weaknesses in the platform’s security practices.

  642. Scenario One
    The names, email address and phone numbers of over three million hotel guests.

    Scenario Two
    Weaknesses in the platform’s security practices.

  643. Scenario One
    The username and password of all of the hotel’s employees.

    Scenario Two
    Weaknesses in the platform’s security practices.

  644. Scenario 1
    The names, email address and phone numbers of over three million hotel guests

    Scenario 2
    Weaknesses in the platform’s security practices.

  645. Scenario 1
    The hotel chain’s reputation.
    Scenario 2
    Weaknesses in the platform’s security practices.

  646. 1. The names, email address and phone numbers of over three million hotel guests.

    2. Weaknesses in the platform’s security practices.

  647. Scenario 1

    The card payment information of over three million guests.
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platform’s security practices.

    Scenario 3

  648. Scenario 1
    The hotel chain’s reputation.
    Scenario 2
    Weaknesses in the platform’s security practices.

  649. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platform’s security practices.

  650. Scenario 1:-The names, email address and phone numbers of over three million hotel guests

    Scenario 2: Weaknesses in the platform’s security practices.

  651. Scenario 1: The names, email address and phone numbers of over three million hotel guests.

    Scenario 2: Weaknesses in the platform’s security practices.

  652. Scenario 1: The names, email address and phone numbers of over three million hotel guests.

    Scenario 2: Weaknesses in the platform’s security practices.

  653. Answer to Scenario 1: The names, email address and phone numbers of over three million hotel guests.

    Answer to Scenario 2: Weaknesses in the platform’s security practices.

  654. The card payment information of over three million guests.
    Weaknesses in the platform’s security practices.

  655. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.
    Scenario 2
    Weaknesses in the platform’s Security practices

  656. Scenario 1: the hackers took;
    The names, email address and phone numbers of over three million hotel guests.

    The username and password of all of the hotel’s employees.

    Scenario 2: the hackers exploits;

    Weaknesses in the platform’s security practices.

  657. The names, email address and phone numbers of over three million hotel guests.

    Weaknesses in the platform’s security practices.

  658. Question 1:The card payment information of over three million guests., The names, email address and phone numbers of over three million hotel guests and The username and password of all of the hotel’s employees.

    Question 2: Weaknesses in the platform’s security practices.

  659. Question 1
    The names, email address and phone numbers of over three million hotel guests.
    Question 2
    Weaknesses in the platform’s security practices.

  660. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Scénario 2
    Weaknesses in the platform’s security practices.

  661. Scenario 1.
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    1. Weaknesses in the platform’s security practices.
    By: Olalekan

  662. Day 2 Answers – Cyber Attackers

    1. Gray hat
    2. Black hat.
    3. White hat
    4.Black hat
    5. White hat.

    1. The names, email address and phone numbers of over three million hotel guests.
      Weaknesses in the platform’s security practices.

  663. Scenario 1. The hotel chain’s reputation.

    Scenario 2. Weaknesses in the platform’s security practices.

  664. Scenario 1 (The Hotel)

    2. The names, email address and phone numbers of over three million hotel guests.

    Scenario 2 (e-learning platform at risk)

    1. Weaknesses in the platform’s security practices.

  665. Scenario 1
    The names, email addresses and phone numbers of over 3 million hotel people

    Scenario 2

    Weakness in platform security practices

  666. Scenario 1
    Personal details of hotel guests which includes emails, names and addresses

    Scenario 2
    Security platform not safe but weak

  667. Scenario 1 answer:

    2. The names, email address and phone numbers of over three million hotel guests.

    Scenario 2 answer:

    Weaknesses in the platform’s security practices.

  668. Scenario 1 Answer:
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2 Answer:
    Weaknesses in the platform’s security practices.

  669. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.
    Scenario 2
    Weaknesses in the platform’s security practices.

  670. DORIS OGOCHUKWU
    1.The names, email address and phone numbers of over three million hotel guests.

    2.Weaknesses in the platform’s security practices

    1. Day 1

      – Scenario 1
      The names, email addresses, and phone numbers of over three million hotel guests.

      – Scenario 2
      Weaknesses in the platform’s security practices.

  671. The names, email address and phone numbers of over three million hotel guests.

    Weaknesses in the platform’s security practices.

  672. The names, email address and phone numbers of over three million hotel guests.
    2. Weaknesses in the platform’s security practices

  673. 1. The names, email address and phone numbers of over three million hotel guests.
    2. Weaknesses in the platform’s security practices.

  674. 1 The names, email address and phone numbers of over three million hotel guests.

    2 Weaknesses in the platform’s security practices.

  675. 1. The username and password of all of the hotel’s employees.

    2. Weaknesses in the platform’s security practices.

  676. 1.The names, email address and phone numbers of over three million hotel guests.

    2.Weaknesses in the platform’s security practices

    Bolaji
    Group 2

  677. 1. The names, email address and phone numbers of over three million hotel guests.
    2. Weaknesses in the platform’s security practices

  678. 1.The names, email address and phone numbers of over three million hotel guests.

    2.Weaknesses in the platform’s security practices

  679. 1.The names, email address and phone numbers of over three million hotel guests.

    2.Weaknesses in the platform’s security practices

  680. Module 1

    Scenario 1 (The Hotel)
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2 (The E-learning platform @ risk)

    Weaknesses in the platform’s security practices.

  681. Day 1

    Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platform’s security practices.

  682. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platform’s security practices.

  683. Day 1

    Scenario 2
    The names, email addresses, and, phone numbers of over three million hotel guests

    Scenario 2
    Weaknesses in the platform’s security practices.

  684. Day 1

    Scenario 1

    The names, email addresses, and phone numbers of over three million hotel guests.

    Scenario 2

    Weaknesses in the platform’s security practices.

  685. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platform’s security practices.

    Module 2

    1. White Hat
    2. Black Hat
    3. Gray Hat
    4. Black Hat
    5. White Hat

  686. Day 1

    The card payment information of over three million guests.

    Question 2
    Weaknesses in the platform’s security practices.

  687. Scenario 1

    The card payment information of over three million guests.

    Scenario 2

    Weaknesses in the platform’s security practices.

  688. The username and password of all of the hotel’s employees.

    Taking advantage of student information not being correctly validated on the platform.

  689. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    The hotel chain’s reputation

    Scenario 2
    Weaknesses in the platform’s security practices.

    Taking advantage of student information not being correctly validated on the platform.

    1. Day 1
      1. The names, email address and phone numbers of over three million hotel guests.

      2.Weaknesses in the platform’s security practices.

  690. The names, email address and phone numbers of over three million hotel guests.

    Weaknesses in the platform’s security practices.

  691. Scenario 1
    The hotel chain’s reputation.

    Scenario 2
    Weaknesses in the platform’s security practices.

  692. Scenario 1
    The hotel chain’s reputation.

    Scenario 2
    Weaknesses in the platform’s security practices.

  693. Cyber attackers: What color is my hat
    1. Gray hat
    2. Black hat
    3. White hat
    4. Black hat
    5. White hat

  694. Osemene Nonyelum Esther.
    CYBER ATTACKS.

    QUESTION I
    White hat.

    QUESTION 2
    Black hat.

    QUESTION 3
    Gray hat.

    QUESTION 4
    Black hat.

    QUESTION 5
    White hat.

  695. Scenario 1:
    1. The card payment information of over three million guests.
    2. The names, email address and phone numbers of over three million hotel guests.

    Scenario 2:
    Weaknesses in the platform’s security practices.

  696. 1)The names, email address and phone numbers of over three million hotel guests

    2)Weaknesses in the platform’s security practices.

  697. Scenario 1: The names, email address and phone numbers of over three million hotel guests

    Scenario 2: Weaknesses in the platform’s security practices.

  698. The names, email address and phone numbers of over three million hotel guests.

    The hotel chain’s reputation.

  699. SCENARIO 1: The names, email address and phone numbers of over three million hotel guests.
    SCENARIO 2: Weaknesses in the platform’s security practices

  700. SCENARIO 1: The names, email address and phone numbers of over three million hotel guests

    SCENARIO 2: Weaknesses in the platform’s security practices.

  701. Scenario 1: The names, email address and phone numbers of over three million hotel guests

  702. Scenario 1

    3. The hotel chain’s reputation.

    Scenario 2

    Weaknesses in the platform’s security practices.

  703. SCENARIO 1:
    The names, email address and phone numbers of over three million hotel guests.

    SCENARIO 2:
    Weaknesses in the platform’s security practices

  704. The card payment information of over three million guests.

    Weaknesses in the platform’s security practices.

  705. Scenario 1

    The hotel chain’s reputation.

    Scenario 2

    Weaknesses in the platform’s security practices.

  706. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platform’s security practices.

  707. Scenerio 1
    The names, email addresses and phone number of I’ve three million guest.

    Scenerio 2
    Weaknesses in the platforms security practices

  708. 1. The names, email address and phone numbers of over three million hotel guests
    2. Weaknesses in the platform’s security practices

  709. Scenario 1
    The card payment information of over three million guests.
    The names, email addresses and phone numbers of over three million hotel guests.
    Scenario 2
    Weaknesses in the platform’s security practices.

  710. 1. The names, email address and phone numbers of over three million hotel guests

    2. Weaknesses in the platform’s security practices.

  711. 1.Taking advantage of student information not being correctly validated on the platform.

    2.The names, email address and phone numbers of over three million hotel guests.

  712. Scenario 1
    The username and password of all of the hotel’s employees.
    The names, email address and phone numbers of over three million hotel guests.

  713. Weaknesses in the platform’s security practices.
    Extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer.
    Bypassing the platform’s access control methods.
    Taking advantage of student information not being correctly validated on the platform.

  714. The username and password of all of the hotel’s employees.
    The names, email address and phone numbers of over three million hotel guests.

  715. Scenario 1:
    The card payment information of over three million guests.
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2:
    Weaknesses in the platform’s security practices

  716. Scenario 1

    The hotel chain’s reputation.

    Scenario 2

    Weaknesses in the platform’s security practices.

  717. Scenario 1: The names, email address and phone numbers of over three million hotel guests.
    Scenario 2: Weaknesses in the platform’s security practices.

  718. Scenario 1: The names, email address and phone numbers of over three million hotel guests.
    Scenario 2: Weaknesses in the platform’s security practices.

  719. The names, email address and phone numbers of over three million hotel guests
    Weaknesses in the platform’s security practices.

  720. Scenario 1: The names, email address and phone numbers of over three million hotel guests

    Scenario 2: Weaknesses in the platform’s security practices.

    1. SCENARIO 1:
      The names, email address and phone numbers of over three million hotel guests.

      SCENARIO 2:
      Weaknesses in the platform’s security practices

  721. Scenario 1- The names, email address and phone numbers of over three million hotel guests.
    Scenario 2- Weaknesses in the platform’s security practices.

  722. Senerio 1:
    The names, email address and phone numbers of over three million hotel guests.

    Senerio 2:
    Weaknesses in the platform’s security practices.

  723. Scenario 1: The names, email addresses, and phone numbers of over three million hotel guests.

    Scenario 2: Weaknesses in the platform’s security practices.

  724. The card payment information of over three million guests.
    Weaknesses in the platform’s security practices.

  725. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.
    Scenario 2
    Weaknesses in the platform’s security practices.

  726. Scenario 1
    The names, email addresses, and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platform’s security practices.

  727. Scenario 1.
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2.
    Weaknesses in the platform’s security practices.

  728. Scenario 1.
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platform’s security practices.

  729. Scenario 1: The names, email address and phone numbers of over three million hotel guests.
    Scenario 2: Weaknesses in the platform security practices.

  730. Scenario 1 answer
    The names, email address and phone numbers of over three million hotel guests.
    Scenario 2 answer
    Weaknesses in the platform’s security practices.

  731. The names, email address and phone numbers of over three million hotel guests.

    Weaknesses in the platform’s security practices

  732. The names, email address and phone numbers of over three million hotel guests
    Weaknesses in the platform’s security practices.

  733. The username and password of all of the hotel’s employees.
    Weaknesses in the platform’s security practices.

  734. Scenerio 1 Answer:
    The names, email address and phone numbers of over three million hotel guests.

    Scenerio 2 Answer:
    Weaknesses in the platform’s security practices.
    Bypassing the platform’s access control methods.
    Taking advantage of student information not being correctly validated on the platform

  735. The hotel chain’s reputation.
    The names, email address and phone numbers of over three million hotel guests.

  736. SCENERIO2: Extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer

  737. Scenario 1: The names, email address and phone numbers of over three million hotel guests.
    Scenario 2: Weaknesses in the platform’s security practices.

  738. Bypassing the platform’s access control methods.
    Taking advantage of student information not being correctly validated on the platform.
    Related

  739. 1. The names, email address and phone numbers of over three million hotel guests.

    2. Weaknesses in the platform’s security practices.

  740. 1. Names, email addresses and phone numbers of over three million hotel guests

    2.The hotel chain’s reputation.
    ( this includes the credibility and security reliability of the hotel)

  741. 1. The names, email address and phone numbers of over three million hotel guests.
    2. Weaknesses in the platform’s security practices.

  742. 1. The names, email address and phone numbers of over three million hotel guests.
    2. Weaknesses in the platform’s security practices.

  743. 1. The names, email address and phone numbers of over three million hotel guests.
    2. Weaknesses in the platform’s security practices.

  744. 1.The names, email address and phone numbers of over three million hotel guests.
    2.Extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer.

  745. Scenerio I
    The names, email address and phone numbers of over three million hotel guests.

    Scenerio 2
    Taking advantage of student information not being correctly validated on the platform.

  746. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Taking advantage of student information not being correctly validated on the platform.

  747. Scenero 2

    1. The username and password of all of the hotel’s employees.

    2.
    Weaknesses in the platform’s security practices.

  748. 1. The username and password of all of the hotel’s employees.

    2.
    Weaknesses in the platform’s security practices.

  749. 1. The username and password of all of the hotel’s employees.

    2.
    Weaknesses in the platform’s security practices.

    3

  750. 1. The names, email address and phone numbers of over three million hotel guests.
    2. Weaknesses in the platform’s security practices.

  751. 1. The username and password of all of the hotel’s employees.
    2. Weaknesses in the platform’s security practices.

  752. 1. The card payment information of over three million guests.
    2. Weaknesses in the platform’s security practices.

  753. 1. The username and password of all of the hotel’s employees
    2. Weaknesses in the platform’s security practices.

  754. 1. The names, email address and phone numbers of over three million hotel guests.

    2. Weaknesses in the platform’s security practices.

  755. Scenario 1.The names, email address and phone numbers of over three million hotel guests.
    Scenario 2. Weaknesses in the platform’s security practices.

  756. Scenario 1: The names, email address and phone numbers of over three million hotel guests.

    Scenario 2: Weaknesses in the platform’s security practices.

  757. Scenario 1: The names, email address and phone numbers of over three million hotel guests.

    Scenario 2: Taking advantage of student information not being correctly validated on the platform.

  758. Scenario 1: The names, email address and phone numbers of over three million hotel guests.
    Scenario 2: Weaknesses in the platform’s security practices.

  759. scenario 1: names, email address and phone numbers of over three million hotel guests.

    scenario 2: weaknesses in the platform’s security practices

  760. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platform’s security practices.

  761. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platform’s security practices.

  762. The names, email address and phone numbers of over three million hotel guests.
    Weaknesses in the platform’s security practices.

  763. The names, email address and phone numbers of over three million hotel guests.
    Weaknesses in the platform’s security practices.

  764. 2-The names, email address and phone numbers of over three million hotel guests.

    Weaknesses in the platform’s security practices.

  765. 1 The names, email address and phone numbers of over three million hotel guests.
    2.Weaknesses in the platform’s security practices.

  766. 1
    The username and password of all of the hotel’s employees
    2
    Weaknesses in the platform’s security practices.

  767. The names, email address and phone numbers of over three million hotel guests.
    Scenerio 2
    Weaknesses in the platform’s security practices.

  768. Scenario 1
    1. The card payment information of over three million guests.
    2. The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    1. Weaknesses in the platform’s security practices.

  769. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platform’s security practices.

  770. 1. The card payment information of over three million guests.
    Scenario 2.
    2. Weaknesses in the platform’s security practices

  771. 1. The names, email address and phone numbers of over three million hotel guests.
    2. Weaknesses in the platform’s security practices.

  772. 1. The names, email address and phone numbers of over three million hotel guests.
    2. Weaknesses in the platform’s security practices.

  773. The names, email address and phone numbers of over three million hotel guests .
    Weaknesses in the platform’s security practices.

  774. Scenerio1
    The names, email address and phone numbers of over three million hotel guests.
    Scenerio2
    Weaknesses in the platform’s security practices.

  775. The names, email address and phone numbers of over three million hotel guests.

    Weaknesses in the platform’s security practices.

  776. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platform’s security practices.

  777. scenario 2
    Weaknesses in the platform’s security practices.

    Extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer.
    Bypassing the platform’s access control methods.

    Taking advantage of student information not being correctly validated on the platform.

  778. The names, email address and phone numbers of over three million hotel guests.

    The hotel chain’s reputation.

  779. Scenario 1
    The username and password of all of the hotel’s employees.
    Scenario 2
    Weaknesses in the platform’s security practices.

  780. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platform’s security practices.

  781. The card payment information of over three million guests.

    Weaknesses in the platform’s security practices.

  782. scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    scenario 2
    Weaknesses in the platform’s security practices.

  783. Scenario 1
    The hotel chain’s reputation.

    Scenario 2
    Weaknesses in the platform’s security practices.

  784. Scenerio 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenerio 2
    Weaknesses in the platform’s security practices.

  785. The card payment information of over three million guests.

    Weaknesses in the platform’s security practices.

  786. The names, email address and phone numbers of over three million hotel guests.

    Weaknesses in the platform’s security practices.

  787. The names, email address and phone numbers of over three million hotel guests.

    Weaknesses in the platform’s security practices.

  788. Scenario 1
    -The hotel chain’s reputation.

    Scenario 2
    -Weaknesses in the platform’s security practices.

  789. The names, email address and phone numbers of over three million hotel guests.
    scenario 2
    Weaknesses in the platform’s security practices.

  790. Scenario 1:
    -The card payment information of over three million guests.
    -The hotel chain’s reputation.
    Scenario 2:
    -Weaknesses in the platform’s security practices.

  791. Scenario 1
    The hotel chain’s reputation
    Scenario 2
    Bypassing the platform’s access control methods.

  792. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weakness in the platform’s security practices

  793. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weakness in the platform’s security practices

  794. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    The username and password of all of the hotel’s employees.

    Scenario 2
    Weaknesses in the platform’s security practices.

    1. Scenario 1
      The names, email address and phone numbers of over three million hotel guests

      Scenario 2.
      Weaknesses in the platform’s security practices.

  795. Scenario 1
    The username and password of all the hotel’s employees

    Scenario 2
    Weakness in the platform’s security

  796. Scenario 1:- The card payment information of over three million guests.

    Scenario 2:- Weaknesses in the platform’s security practices.

  797. for the first senerio they took the hotel chain’s reputation. then for the second senerio the exploited the Weaknesses in the platform’s security practices

  798. SCENARIO 1
    The username and password of all of the hotel’s employees.

    SCENARIO 2
    Bypassing the platform’s access control methods.

  799. The names, email address and phone numbers of over three million hotel guests

    SCENARIO 2
    Weaknesses in the platform’s security practices.

  800. SCENARIO 1
    The names, email address and phone numbers of over three million hotel guests

    SCENARIO 2
    Weaknesses in the platform’s security practices.

  801. SCENARIO 1
    The names, email address and phone numbers of over three million hotel guests.

    SCENARIO 2
    Weaknesses in the platform’s security practices.

  802. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weakness in the platform’s security practices

  803. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weakness in the platform’s security practices

  804. 1-The names, email address and phone numbers of over three million hotel guests.

    2-Weaknesses in the platform’s security practices.

  805. Scenario 1
    The username and password of all of the hotel’s employees.
    Scenario 2
    Bypassing the platform’s access control methods.

  806. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platform’s security practices.

  807. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platform’s security practices.

  808. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platform’s security practices.

  809. The names, email address and phone numbers of over three million hotel
    Weaknesses in the platform’s security practices.

    Weaknesses in the platform’s security practices.

  810. Extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer.

  811. Scenario 1

    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2

    Weaknesses in the platform’s security practices.

  812. My Answers

    1. Gray hat
    2. Black hat
    3. White hat
    4. Black hat
    5. White hat

    Class completed for the day

  813. 1. The names, email address and phone numbers of over three million hotel guests.

    2. Weaknesses in the platform’s security practices.

  814. Scenario 1

    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2

    Weaknesses in the platform’s security practices.

  815. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platform’s security practices.

  816. answer 1: white hat
    answer 2: black hat
    answer 3: white hat
    answer4: gray hat
    answer 5: gray hat

  817. The names, email address and phone numbers of over three million hotel guests.

    The hotel chain’s reputation.

  818. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platform’s security practices.

  819. Senerio 1- The username and password of all of the hotel’s employees.

    Senerio 2- Weaknesses in the platform’s security practices.

     

  820. Extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer.

  821. The names, email address and phone numbers of over three million hotel guests.
    Weaknesses in the platform’s security practices.

    1. 1.Gray hat attackers
      2. Black hat attackers
      3. White hat attackers
      4. Black hat ATTACKERS
      5. White hat attackers

  822. Scenario 1 – The card payment information of over three million guests

    Scenario 2- Weaknesses in the platform’s security practices.

  823. Scenario 1 – The username and password of all of the hotel’s employees.

    Scenario 2 – Weaknesses in the platform’s security practices.

  824. SCENARIO 1 The names, email address and phone numbers of over three million hotel guests.
    SCENARIO 2 Weaknesses in the platform’s security practices.

  825. The username and password of all of the hotel’s employees.
    Weaknesses in the platform’s security practices.

  826. The card payment information of over three million guests.

    Scenario 2
    Bypassing the platform’s access control methods

  827. Scenario 1

    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2.

    Taking advantage of student information not being correctly validated on the platform.

  828. scenario 1: The names, email address and phone numbers of over three million hotel guests.

  829. Scenario 1:The names, email address and phone numbers of over three million hotel guests.
    Scenario 2: Weaknesses in the platform’s security practices.

  830. Scenerio 1: The names, email address and phone numbers of over three million hotel guests.

    Scenerio 2: Weaknesses in the platform’s security practices.

  831. Scenerio 1: The names, email address and phone numbers of over three million hotel guests.

    Scenerio 2: Weaknesses in the platform’s security practices.

  832. Scenerio 1: The names, email address and phone numbers of over three million hotel guests.

    Scenerio 2: Weaknesses in the platform’s security practices.

  833. Question 1 answer – The names, email address and phone numbers of over three million hotel guests.

    Question 2 answer – Weaknesses in the platform’s security practices.

  834. Question 1 answer – The names, email address and phone numbers of over three million hotel guests.

    Question 2 answer- Weaknesses in the platform’s security practices.

    Bypassing the platform’s access control methods.

  835. Senerio 1: B. The names, email address and phone numbers of over three million hotel guests

    Senerio 2: Weaknesses in the platform’s security practices.

  836. Scenario 1
    The card payment information of over three million guests.

    Scenario 2
    Weaknesses in the platform’s security practices.

  837. Scenario 1
    The card payment information of over three million guests.
    Scenario 2
    Weaknesses in the platform’s security practices.

  838. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.
    Scenario 2
    Weaknesses in the platform’s security practices.

  839. Scenario 1:
    The names, email address and phone numbers of over three million hotel guests

    Scenario 2:
    Weaknesses in the platform’s security practices.

  840. Scenario 1
    The names, email address and phone numbers of over three million hotel guests

    Scenario 2
    Weaknesses in the platform’s security practices.

  841. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platform’s security practices.

  842. Scenario 1:
    1. The names, email addresses, and phone numbers of over three million hotel guests.
    2. Hotel chain reputation

    Scenario 2
    1. Weaknesses in the platform’s security practices

  843. Scenerio 1 :
    The card payment information of over three million guests.

    The names, email address and phone numbers of over three million hotel guests.

    The hotel chain’s reputation.

    Scenerio 2 :
    Weaknesses in the platform’s security practices.

  844. Scenario 1.
    The card payment information of over three million guests.

    Scenario 2.
    Weaknesses in the platform’s security practices.

  845. Scenario 1:
    3. The hotel chain’s reputation.

    Scenario 2:
    1. Weaknesses in the platform’s security practices.

  846. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platform’s security practices.

  847. The card payment information of over three million guests.
    Extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer.

  848. Secenerio 1:
    3. The hotel chain’s reputation.

    Secenerio 2:
    1. Weaknesses in the platform’s security practices.

  849. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.
    Scenario 2
    Weaknesses in the platform’s security practices.

  850. The names, email address and phone numbers of over three million hotel guests.
    Weaknesses in the platform’s security practices

  851. The names, email address and phone numbers of over three million hotel guests.
    Weaknesses in the platform’s security practices.

  852. The username and password of all of the hotel’s employees.

    Weaknesses in the platform’s security practices.

  853. 1. The names, email address and phone numbers of over three million hotel guests.

    2. Weaknesses in the platform’s security practices.

  854. Hi, Am at the first stage of Cyber Security Beginners course quiz, but I cant find the questions to the answer written, I need help with where to find the question to the answers pls.

  855. 1. The names, email address and phone numbers of over three million hotel guests.

    2 Weaknesses in the platform’s security practices.

  856. Scenario 1
    Ans: The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Ans: Weaknesses in the platform’s security practices.

  857. Scenario 1: The names, email address and phone numbers of over three million hotel guests.

    Scenerio 2: Weaknesses in the platform’s security practices.

  858. Scenario 1: The names, email address and phone numbers of over three million hotel guests.

    Scenario 2: Weaknesses in the platform’s security practices.

  859. 1. The names, email address and phone numbers of over three million hotel guests.

    2. Weaknesses in the platform’s security practices.

  860. Scenario 1.Names, email address and phone numbers of over three million hotel guests.

    Scenario 2. Weaknesses in the platform’s security practices.

  861. Scenario 1: The names, email address and phone numbers of over three million hotel guests.

    Scenario 1: Taking advantage of student information not being correctly validated on the platform.

  862. Scenario 1. names, email address and phone numbers of over three million hotel guests
    Scenario 2.Weaknesses in the platform’s security practices.

  863. Scenario 1: The names, email address and phone numbers of over three million hotel guests.
    Scenario 2: Weaknesses in the platform’s security practices.

  864. Scenario 1: The names, email address and phone numbers of over three million hotel guests.

    Scenario 2: Weaknesses in the platform’s security practices.

  865. Scenario 1: The names, email addresses, and phone numbers of over three million hotel guests.
    Scenario 2: Student information left exposed

  866. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.
    Scenario 2
    Bypassing the platform’s access control methods.

  867. Scenario 1: The names, email address and phone numbers of over three million hotel guests.

    Scenario 2: Bypassing the platform’s access control methods.

  868. The names, email address and phone numbers of over three million hotel guests
    The hotel chain’s reputation.

    Bypassing the platform’s access control methods

    Weaknesses in the platform’s security practices

  869. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platform’s security practices.

  870. 1. The names, email address and phone numbers of over three million hotel guests.
    2. Weaknesses in the platform’s security practices.

  871. 1.The names, email address and phone numbers of over three million hotel guests.
    2.Weaknesses in the platform’s security practi

  872. 1.The names, email address and phone numbers of over three million hotel guests.
    2.Weaknesses in the platform’s security practices

  873. Scenario 1
    The card payment information of over three million guests.

    Scenario 2
    Weaknesses in the platform’s security practices.

  874. Senerio 1: The names, email address and phone numbers of over three million hotel guests.

    Senerio 2: Weaknesses in the platform’s security practices.

  875. Scenario 1

    Answer: The hotel chain’s reputation.

    Scenario 2

    Answer: Weaknesses in the platform’s security practices.

  876. Scenario 1:

    The names, email address and phone numbers of over three million hotel guests

    Scenario 2:

    Weaknesses in the platform’s security practices

  877. Scenario 1
    The hotel chain’s reputation.

    Scenario 2
    Weaknesses in the platform’s security practices.

  878. Scenario 1:
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platform’s security practice.

  879. Scenario 1:
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2: Weaknesses in the platform’s security practices.

  880. The card payment information of over three million guests.

    Weaknesses in the platform’s security practices.

  881. Scenario 1: The hotel chain’s reputation.

    Scenario 2: Weaknesses in the platform’s security practices.

  882. Scenario 1:
    The card payment information of over three million guests.
    The names, email address and phone numbers of over three million hotel guests.
    The username and password of all of the hotel’s employees.

    Scenario 2:
    Weaknesses in the platform’s security practices.

  883. The username and password of all of the hotel’s employees.

    Weaknesses in the platform’s security practices.

  884. 1. The names, email address and phone numbers of over three million hotel guests.

    2. Weaknesses in the platform’s security practices.

  885. The names, email address and phone numbers of over three million hotel guests.

    Bypassing the platform’s access control methods.

  886. Senario 1: The names, email address and phone numbers of over three million hotel guests.

    Senario 2: Taking advantage of student information not being correctly validated on the platform.

  887. scenario 1. The hotel chain’s reputation.

    Scenario 2. Weaknesses in the platform’s security practices.

  888. 1. The names, email address and phone numbers of over three million hotel guests.

    2. Weaknesses in the platform’s security practices.

  889. The names, email address and phone numbers of over three million hotel guests.

    Weaknesses in the platform’s security practices.

  890. scenario 1
    The card payment information of over three million guests.

    The names, email address and phone numbers of over three million hotel guests.

    The hotel chain’s reputation.

    scenario 2
    Bypassing the platform’s access control methods.

  891. Senario 1
    The names, email address and phone numbers of over three million hotel guests.

    Senario 2
    Weaknesses in the platform’s security practices.

  892. Scenerio 1.
    The hotel chain’s reputation.

    Scenerio 2,
    Weaknesses in the platform’s security practices.

  893. Scenario 1 Weaknesses in the platform’s security practices
    Scenario 2 The hotel chain’s reputation.

    1. Scenerio 1.
      The hotel chain’s reputation.

      Scenerio 2,
      Weaknesses in the platform’s security practices.

  894. Scenerio 1.
    The hotel chain’s reputation.

    Scenerio 2,
    Weaknesses in the platform’s security practices.

  895. Scenario I
    What was taken?
    The hotel chain’s reputation

    Scenario 2
    What exploits?
    Weaknesses in the platform’s security practices.

  896. Senario 1
    The names, email address and phone numbers of over three million hotel guests.

    Senario 2
    Weaknesses in the platform’s security practices.

  897. Senario 1
    The names, email address and phone numbers of over three million hotel guests.

    Senario 2
    Weaknesses in the platform’s security practices.

  898. *The names, email address and phone numbers of over three million hotel guests.
    *Weaknesses in the platform’s security practices.

  899. Senario 1
    The card payment information of over three million guests

    Senario 2
    Weaknesses in the platform’s security practices.

  900. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer.

  901. Scenario 1

    The hotel chain’s reputation.

    Scenario 2

    Weaknesses in the platform’s security practices.

  902. Scenario 1: The names, email address and phone numbers of over three million hotel guests.

    Scenario 2: Weaknesses in the platform’s security practices.

  903. Scenario 1
    The hotel chain’s reputation.

    Scenario 2
    Weaknesses in the platform’s security practices.

  904. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platform’s security practices.

  905. Senecio 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platform’s security practices.

  906. Scenario 1: The names, email address and phone numbers of over three million hotel guests

    Scenario 2: Weaknesses in the platform’s security practices.

    1. Scenario 1
      The names, email address and phone numbers of over three million hotel guests.
      Scenario 2
      Weaknesses in the platform’s security practices.

  907. Scenario 1. The names, email addresses and phone numbers of over three million hotel guests.
    The card payment information of over three million guests.

    Scenario 2. Weaknesses in the platform’s security practices.

  908. Scenario 1: The names, email address and phone numbers of over three million hotel guests.

    Scenario 2: Taking advantage of student information not being correctly validated on the platform.

  909. Scenario 1:
    The card payment information of over three million guests.

    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2: Weaknesses in the platform’s security practices.

  910. The names, email address and phone numbers of over three million hotel guests.

    Weaknesses in the platform’s security practices.

  911. scenario 1:The card payment information of over three million guests
    scenario 2:
    Weaknesses in the platform’s security practices

  912. Scenario1:
    The hotel chain’s reputation

    Scenario 2:
    Weaknesses in the platform’s security practices.

  913. The names, email address and phone numbers of over three million hotel guests.

    Weaknesses in the platform’s security practices.

  914. 1)The names, email address and phone numbers of over three million hotel guests.
    2)Weaknesses in the platform’s security practices.

  915. Scenario 1:
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2:
    Weaknesses in the platform’s security practices.

  916. Scenario 1:
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2:
    Weaknesses in the platform’s security practices.

  917. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.
    Scenario 2
    Weaknesses in the platform’s security practices.

  918. Scenario 1:
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2:
    Weaknesses in the platform’s security practices.

  919. Scenario 1

    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2

    Weaknesses in the platform’s security practices

  920. Scenario 1
    Answer – The hotel chain’s reputation

    Scenario 2
    Answer – Weaknesses in the platform’s security practices.

  921. Scenario 1:
    The card payment information of over three million guests.

    The names, email address and phone numbers of over three million hotel guests.

    The hotel chain’s reputation.

    Scenario 2:
    Weaknesses in the platform’s security practices.

  922. 1)The names, email address and phone numbers of over three million hotel guest
    2)Weaknesses in the platform’s security practices.

  923. SCENARIO 1
    The username and password of all of the hotel’s employees.

    SCENARIO 2
    Weaknesses in the platform’s security practices.

  924. 1) The names, email address and phone numbers of over three million hotel guests.

    2)Weaknesses in the platform’s security practices.

  925. 1) The names, email address and phone numbers of over three million hotel guests.

    2)Weaknesses in the platform’s security practices.

  926. Scenerio 1:The names, email address and phone numbers of over three million hotel guests.

    Scenerio2: Weaknesses in the platform’s security practices.

  927. 1.The names, email address and phone numbers of over three million hotel guests.
    2.Weaknesses in the platform’s security practices.

  928. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platform’s security practices.

  929. scenario 1: The names, email address and phone numbers of over three million hotel guests.
    scenario 2: Weaknesses in the platform’s security practices.

  930. Scenario 1

    The names, email addresses, and phone numbers of over three million hotel guests.

    Scenario 2

    Weaknesses in the platform’s security practices.

  931. Scenario 1. The names, email address and phone numbers of over three million hotel guests.

    Scenario 2. Weaknesses in the platform’s security practices.

  932. Scenario 1
    The hotel chain’s reputation.

    Scenario 2
    Weaknesses in the platform’s security practices.

  933. Scenerio 1:
    The hotel chain’s reputation.
    The names, email address and phone numbers of over three million hotel guests.

    Scenerio 2:
    Weaknesses in the platform’s security practices.
    Bypassing the platform’s access control methods.

  934. Scenario 1: The names, email address and phone numbers of over three million hotel guests.

    Scenario 2:
    Weaknesses in the platform’s security practices.

  935. Scenario 1- The username and password of all of the hotel’s employees.

    Scenario 2 – Extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer.

  936. Scenario 1:-The names, email address and phone numbers of over three million hotel guests

    Scenario 2:- Weaknesses in the platform’s security practices.

  937. 1. White hat attacker

    2. Black hat attacker

    3. Gray hat attacker

    4. Black hat attacker

    5. White hat attacker

  938. Kingsley Okolie
    Cohort 2, Cyber security for beginners
    Team 3

    Scenario 1- The names, email address and phone numbers of over three million hotel guests.

    Scenario 2 – Weaknesses in the platform’s security practices.

  939. Scenario 1
    The names, email addresses and phone numbers of over three million hotel guests

    Scenario 2
    Weaknesses in the platform’s security practices.

  940. Scenario 1
    The names, email addresses and phone numbers of over three million hotel guests

    Scenario 2
    Weaknesses in the platform’s security practices.

  941. 1) The names, email address and phone numbers of over three million hotel guests.

    2) Weaknesses in the platform’s security practices.

  942. Scenario 2: Taking advantage of student information not being correctly validated on the platform.

  943. Section 1 – The names, email address and phone numbers of over three million hotel guests.
    The hotel chain’s reputation.
    Section 2 – Weaknesses in the platform’s security practices.
    Bypassing the platform’s access control methods.

  944. Scenario 1

    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2

    Weaknesses in the platform’s security practices.

  945. Sceneraio 1
    The names, email address and phone numbers of over three million hotel guests.

    Sceneraio 2
    Weaknesses in the platform’s security practices.

  946. Scenario 1
    The hotel chain’s reputation.
    Scenario 2
    Weaknesses in the platform’s security practices.

  947. 1. The names, email address and phone numbers of over three million hotel guests
    2. Weaknesses in the platform’s security practices.

    1. Scenario 1

      The names, email address and phone numbers of over three million hotel guests.

      Scenario 2

      Weaknesses in the platform’s security practices.

  948. scenario 1: The names, email address and phone numbers of over three million hotel guests

    senario 2:weakness in the platform security practices

  949. Scenario 1: The names, email address and phone numbers of over three million hotel guests.

    Scenario 2: Weaknesses in the platform’s security practices

  950. Scenario 1 – The hotel chain’s reputation.
    Scenario 2 – Weaknesses in the platform’s security practices.

  951. Scenerio 1- The hotel chain’s reputation.

    Scenerio 2- Weaknesses in the platform’s security practices.

  952. 1. The names, email address and phone numbers of over three million hotel guests.
    2. Bypassing the platform’s access control methods.

  953. Scenario 1: The names, email addresses, and phone numbers of over three million hotel guests.

    Scenario 2: Weaknesses in the platform’s security practices.

  954. Scenario 1;
    The names, email addresses and phone numbers of over three million hotel guests.

    Scenario 2;
    Weaknesses in the platform’s security practices.

  955. 1)The names, email address and phone numbers of over three million hotel guests.
    2) weakness in the platform’s security practices

  956. The card payment information of over three million guests.
    The hotel chain’s reputation.
    The username and password of all of the hotel’s employees.

  957. Scenerio 1:
    The hotel chain’s reputation.

    Scenerio 2:
    Weaknesses in the platform’s security practices.

  958. Scenario 1: The names, email address and phone numbers of over three million hotel guests.

    Scenario 2: Weaknesses in the platform’s security practices.

  959. 1st Scenario :The names,email address and phone numbers of over three million hotel guest

    2nd Scenario :Weakness in the platform’s security practices

  960. 1st Scenario: The names, email address and phone numbers of over three million hotel guests.
    2nd Scenario: Weaknesses in the platform’s security practices.

  961. 1st scenerio: The names, email address and phone numbers of over three million hotel guests.

    2nd scenerio: Weaknesses in the platform’s security practices.

  962. Scenario 1:
    Ans:
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2:
    Ans:
    Weaknesses in the platform’s security practices.

  963. What color is my hat?

    1) Grey hat
    2) Black hat
    3) White hat
    4) Black hat
    5) White hat

    1) The names, email address and phone numbers of over three million hotel guests.
    The hotel chain’s reputation.

    2) Weaknesses in the platform’s security practices

  964. 1) The card payment information of over three million guest

    2) Weakness in the platforms security practices

  965. Scenario 1: The names, email address and phone numbers of over three million hotel guests.

    Scenario 2: Weaknesses in the platform’s security practices.

  966. first scenario
    The username and password of all of the hotel’s employees

    second scenario
    Weaknesses in the platform’s security practices.

  967. Scenario 1
    The card payment information of over three million guests.
    Scenario 2
    Weaknesses in the platform’s security practices.

  968. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platform’s security practices.

  969. Scenario one;
    Answer: the names, email addresses and phone numbers of over three million hotel guests.

    Scenario two:
    Answer: weakness in the platform’s security practices

  970. While it’s unclear what the hackers have done with this acquired information, it’s safe to say that they have everything they need to carry out widespread phishing or malware attacks.

  971. 1.The names, email address and phone numbers of over three million hotel guests.
    2.Weaknesses in the platform’s security practices.

  972. 1. The names, email address and phone numbers of over three million hotel guests,

    2. Weaknesses in the platform’s security practices.

  973. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platform’s security practices

  974. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platform’s security practices.

  975. Scenario 1
    The names, email address and phone
    numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platform’s security practices.

  976. Scenerio 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenerio 2
    Weaknesses in the platform’s security practices.

  977. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.
    The hotel chain’s reputation.
    Scenario 2
    Weaknesses in the platform’s security practices.

  978. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    The hotel chain’s reputation.
    Scenario 2
    Weaknesses in the platform’s security practices.

  979. Scenario 1.
    Ans. The names, email address and phone numbers of over three million hotel guests

    Scenario 2
    Ans. Weaknesses in the platform’s security practices.

  980. 1. The names, email address and phone numbers of over three million hotel guests
    2. Weaknesses in the platform’s security practices

  981. 1 The names,email address and phone numbers of over 3 million hotel guest.
    2 weaknesses in the platform’s security practices.

  982. Scenario 1

    The names, email address and phone numbers of over three million hotel guests

    Scenario 2

    Weaknesses in the platform’s security practices

  983. 1.The names, email address and phone numbers of over three million hotel guests.
    2.Weaknesses in the platform’s security practices.

  984. 1. The names, email addresses and phone numbers of over 3 million hotel guests
    2. weaknesses in the platform’s security practices

  985. 1. Weaknesses in the platform’s security practices.
    2. The names, email address and phone numbers of over three million hotel guests.

    1. WHITE HAT
    2. BLACK HAT
    3. WHITE HAT
    4. BLACK HAT
    5. GRAY HAT

  986. Scenario 1.
    The username and password of all of the hotel’s employees.
    Scenario 2.
    Weaknesses in the platform’s security practices.

  987. Scenario 1.
    The username and password of all of the hotel’s employees.

    Scenario 2.
    Weaknesses in the platform’s security practices.

  988. Scenario one;
    Answer: the names, email addresses and phone numbers of over three million hotel guests.

    Scenario two:
    Answer: weakness in the platform’s security practices.

  989. 1. The names, email address and phone numbers of over three million hotel guests.
    2.Weaknesses in the platform’s security practices.

  990. 1.the names, email address and phone numbers of over three million hotel guests.

    2. Weaknesses in the platform’s security practices.

  991. Scenaria 1: The names, email addresses, and phone numbers of over three million hotel guests.
    Scenario 2: Weaknesses in the platform’s security practices.

  992. Scenario 1: The names, email address and phone numbers of over three million hotel guests.

    Scenario 2: Weaknesses in the platform’s security practices.

  993. 1. The names, email address and phone numbers of over three million hotel guests.
    2. Weaknesses in the platform’s security practices.

  994. Scenario 1
    – The names, email address and phone numbers of over three million hotel guests.
    – The hotel chain reputation
    Scenario 2
    Weaknesses in the platform’s security practices.

  995. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.
    Scenario 2
    Weaknesses in the platform’s security practices.

  996. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.
    Scenario 2
    Weaknesses in the platform’s security practices.

  997. Scenario 1:

    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2:
    Weaknesses in the platform’s security practices.

  998. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.
    Scenario 2
    Weaknesses in the platform’s security practices.

  999. Scenario 1

    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platform’s security practices.

  1000. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.
    Scenario 2
    Weaknesses in the platform’s security practices

  1001. Scenario 1
    * The names, email address and phone numbers of over three million hotel guests.
    Scenario 2
    * Weaknesses in the platform’s security practices.

  1002. Scenario 1 The card payment information of over three million guests.

    Scenario 2 Weaknesses in the platform’s security practices.

  1003. Scenario 1 The card payment information of over three million guests.
    Scenario 2 Weaknesses in the platform’s security practices.

  1004. 1. The names, email address and phone numbers of over three million hotel guests
    2.Weaknesses in the platform’s security practices.

  1005. Scenario 1: The names, email address and phone numbers of over three million hotel guests

    Scenario 2: Weaknesses in the platform’s security practices.

  1006. Scenario 1 : The Names, Email address, and Phone Numbers of over three million hotel guests.

    Scenario 2 : Weakness in the platform security practices.

  1007. SCENARIO 1
    The names, email addresses, and phone numbers of over three million hotel guests.

    SCENARIO 2
    Weaknesses in the platform’s security practices.

  1008. FIRST SCENARIO
    : The names, email addresses, and phone numbers of over three million hotel guests.

    SECOND SCENARIO
    : Weaknesses in the platform’s security practices.

  1009. Scenario 1
    * The names, email address and phone numbers of over three million hotel guests.
    Scenario 2
    * Weaknesses in the platform’s security practices.

  1010. Scenario 1
    *The names, email address and phone numbers of over three million hotel guests.
    *The hotel chain’s reputation.
    scenario 2
    *Weaknesses in the platform’s security practices.

  1011. The names, email address and phone numbers of over three million hotel guests.
    Weaknesses in the platform’s security practices.

  1012. Scenario 1
    *The names, email address and phone numbers of over three million hotel guests.
    *The hotel chain’s reputation.
    scenario 2
    *Weaknesses in the platform’s security practices.

  1013. The names, email address and phone numbers of over three million hotel guests.

    Extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer.

  1014. scenario 1
    *The names, email address and phone numbers of over three million hotel guests.
    *The hotel chain’s reputation.

    scenario 2
    *Weaknesses in the platform’s security practices.

  1015. the use of Chat GPT to create questions for engagement surveys, analyze and also the implementations of AI assistant could even support more ‘proactive’ aspects of HR and allow HR teams to make a real difference to the culture of an organization. But i believe that this will make HRM work more artificial and also reduce manpower

  1016. The card payment information of over three million guests.

    Taking advantage of student information not being correctly validated on the platform.

  1017. Scenerio 1: The names, email address and phone numbers of over three million hotel guests.

    Scenerio 2: Weaknesses in the platform’s security practices.

  1018. Scenerio 1: The card payment information of over three million guests.

    Scenerio 2: Weaknesses in the platform’s security practices.

  1019. SCENARIO 1:
    The card payment information of over three million guests.

    The names, email address and phone numbers of over three million hotel guests.

    The hotel chain’s reputation.

    SCENARIO 2:
    Weaknesses in the platform’s security practices.
    Extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer.
    Bypassing the platform’s access control methods.

  1020. SCENARIO 1: The names, email address and phone numbers of over three million hotel guests.

    SCENARIO 2: Weaknesses in the platform’s security practices.

  1021. SCENARIO 1: The names, email address and phone numbers of over three million hotel guests.

    SCENARIO 2: Weaknesses in the platform’s security practices.

  1022. SCENARIO 1: The names, email address and phone numbers of over three million hotel guests.

    SCENARIO 2: Weaknesses in the platform’s security practices.

  1023. 1. “Mmm… I’m not sure we’re allowed to use the private Wi-Fi network. Let me check with my manager first.”

  1024. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.
    The hotel chain’s reputation.

    Scenario 2
    Weaknesses in the platform’s security practices.
    Taking advantage of student information not being correctly validated on the platform.

  1025. Scenario 1:
    The names, email address and phone numbers of over three million hotel guests.
    Scenario 2:
    Weaknesses in the platform’s security practices.

  1026. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.
    Scenario 2
    Weaknesses in the platform’s security practices.

  1027. Scenario 1: The names, email address and phone numbers of over three million hotel guests.

    Scenario 2:
    Weaknesses in the platform’s security practices.

  1028. Select the correct answer from the options and submit in the learning group.

    1. After hacking into ATM systems remotely using a laptop, this attacker worked with the ATM manufacturers to resolve the identified security vulnerabilities.

    Please select an option
    ° Gray hat

    2. This attacker transferred $10 million into their bank account using customer account and PIN credentials gathered from recordings.

    Please select an option
    ° Black hat

    3. This attacker’s job is to identify weaknesses in a company’s computer system.
    Please select an option
    ° White hat

    4. This attacker used malware to compromise a company’s system and steal credit card information that was then sold to the highest bidder.
    Please select an option
    ° Gray hat

    5. While carrying out some research, this attacker stumbled across a security vulnerability on an organization’s network that they are authorized to access.
    Please select an option
    ° White hat

  1029. 2. The names, email address and phone numbers of over three million hotel guests.

    1. Weaknesses in the platform’s security practices.

  1030. Scenario 1: The names, email address and phone numbers of over three million hotel guests.

    Scenario 2. The username and password of all of the hotel’s employees

  1031. In the first scenario, the cyber-criminals used the username and password of one of the employees to get the information.
    while in the second scenario, I believe the hackers used the Weaknesses in the platform’s security practices. Because how will they explain leaving vital information of their students in a publicly accessible platform.

  1032. 1. Case 1:The names, email address and phone numbers of over three million hotel guests.

    2. Case 2:Weaknesses in the platform’s security practices.

  1033. Hotel scenario: The names, email address and phone numbers of over three million hotel guests.

    Student case scenario: Weaknesses in the platform’s security practices.

  1034. Scenario 1
    The names, email address and phone numbers of over three million hotel guests

    Scenario 2
    Weaknesses in the platform’s security practices.

  1035. Scenario 1

    The card payment information of over three million guests.

    Scenario 2
    Taking advantage of student information not being correctly validated on the platform.

  1036. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.
    Scenario 2
    Weaknesses in the platform’s security practices.

  1037. Scenario 1: The username and password of all of the hotel’s employees.
    Scenario 2: Weaknesses in the platform’s security practices.

  1038. 1:
    The names, email address and phone numbers of over three million hotel guests.

    2:
    Weaknesses in the platform’s security practices.

  1039. Scenario 1:
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2:
    Weaknesses in the platform’s security practices.

  1040. scenario 1;i.The username and password of all of the hotel’s employees.
    iiThe username and password of all of the hotel’s employees.
    scenario 2; Weaknesses in the platform’s security practices.

    1. Scenario 1
      The names, email address and phone numbers of over three million hotel guests.

      Scenario 2
      Weaknesses in the platform’s security practices.

  1041. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platform’s security practices.

  1042. 1. The names, email address and phone numbers of over three million hotel guests.

    2. Weaknesses in the platform’s security practices.

  1043. Q1: The names, email address and phone numbers of over three million hotel guests
    Q2: Weaknesses in the platform’s security practices

  1044. 1 The username and password of all of the hotel’s employees.

    2. Weaknesses in the platform’s security practices.

  1045. Q1. The names, email address and phone numbers of over three million hotel guests.
    Q2. Weaknesses in the platform’s security practices.

  1046. Answer to question 1; The username and password of all of the hotel’s employees.
    Answer to question 2; Weaknesses in the platform’s security practices.

  1047. Q1. The names, email address and phone numbers of over three million hotel guests.

    Q2. Weakness in the platform’s security practice.

  1048. 1. The names, email address and phone numbers of over three million hotel guests.
    2. Weaknesses in the platform’s security practices.

    1. The names, email address and phone numbers of over three million hotel guests.
      Weakness in the platform’s security practices

  1049. Q1. The username and password of all of the hotel’s employees.

    Q2. Weaknesses in the platform’s security practices.

  1050. The names, email address and phone numbers of over three million hotel guests.
    Weaknesses in the platform’s security practices.

  1051. Scenario 1
    The names,email address and phone numbers of over three million hotel guests .
    Scenario 2
    Weaknesses in the platform security practices.

  1052. 1. The names, email address and phone numbers of over three million hotel guests.

    2. Weaknesses in the platform’s security practices.

  1053. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platform’s security practices.

  1054. 1. The names, email address and phone numbers of over three million hotel guests.

    2. Weaknesses in the platform’s security practices.

  1055. Scenario 1: The names, email address and phone numbers of over three million hotel guests.

    Scenario 2: Weaknesses in the platform’s security practices.

  1056. Scenario 1: Answer – 2. The names, email address and phone numbers of over three million hotel guests.

    Scenario 2: Answer – 1. Weaknesses in the platform’s security practices.

  1057. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platform’s security practices

  1058. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.
    Scenario 2
    Weaknesses in the platform’s security practices

  1059. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platform’s security practices.

  1060. Senario 1
    The names, email address and phone numbers of over three million hotel guests.

    Senario 2
    Weaknesses in the platform’s security practices.

  1061. Scenario 1
    The username and password of all of the hotel’s employees.
    Scenario 2
    Weaknesses in the platform’s security practices.

  1062. Scenario 1 – The names, email address and phone numbers of over three million hotel guests.

    Scenario 2 – Weaknesses in the platform’s security practices.

  1063. Scenario 1:
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2:
    Weaknesses in the platform’s security practices

  1064. Scenario 1:
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2:
    Weaknesses in the platform’s security practices.

  1065. Scenario 1.

    The card payment information of over three million guests.
    The names, email address and phone numbers of over three million hotel guests.
    The hotel chain’s reputation.

    Scenario 2.

    Weaknesses in the platform’s security practices.
    Bypassing the platform’s access control methods.

  1066. Scenerio 1
    The names, email address and phone numbers of over three million hotel guests.
    Scenario 2
    Weaknesses in the platform’s security practices.

  1067. Scenario 1

    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2

    Weaknesses in the platform’s security practices.

  1068. Scenario 1;
    Answer: The hotel chain’s reputation

    Scenario 2;
    Answer: Weaknesses in the platform’s security practices.

  1069. Scenario 1
    answer: The hotel chain’s reputation

    Scenario 2
    Answer: Weaknesses in the platform’s security practices

  1070. The names, email address and phone numbers of over three million hotel guests.

    Weaknesses in the platform’s security practices.

  1071. The names, email address and phone numbers of over three million hotel guests.

    Weaknesses in the platform’s security practices.

  1072. first scenario

    The card payment information of over three million guests.
    The names, email address, and phone numbers of over three million hotel guests.
    The hotel chain’s reputation.
    The username and password of all of the hotel’s employees.

    Second scenario

    Weaknesses in the platform’s security practices.
    Extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer.
    Bypassing the platform’s access control methods.

  1073. The card payment information of over three million guests

    The names, email address and phone numbers of over three million hotel guests.

    The username and password of all of the hotel’s employees.

    Weaknesses in the platform’s security practices

  1074. Scenario1
    The name,email address and phone numbers of over three million hotel guests.

    Scenario2
    Weaknesses in the platform security practices

  1075. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platform’s
    security practices.

  1076. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2

    Weaknesses in the platform’s security practices.

  1077. The names, email address and phone numbers of over three million hotel guests.

    Weaknesses in the platform’s security practices.

  1078. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.
    The card payment information of over three million guests.
    Scenario 2
    Weaknesses in the platform’s security practices.

  1079. Scenario 1
    * The names, email address and phone numbers of over three million hotel guests.
    Scenario 2
    * Bypassing the platform’s access control methods.

  1080. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platform’s security practices.

  1081. Assignment for Day 1

    Scenario 1: The names, email address and phone numbers of over three million hotel guests.

    Scenario 2: Weaknesses in the platform’s security practices

  1082. Scenario 1

    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2

    Weaknesses in the platform’s security practices.

    1. 1. The names, email address and phone numbers of over 3 million hotel guests.
      2. Weakness in the platform’s security practices.

  1083. Scenario 1:
    – The names, email address and phone numbers of over three million hotel guests.

    – The hotel chain’s reputation

    Scenario 2:
    Weaknesses in the platform’s security practices

  1084. Scenario 1

    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2

    Weaknesses in the platform’s security practices.

  1085. DAY 1 Assignment

    Day 1- The names, email address and phone numbers of over three million hotel guests

    SCENARIO 2-Weakness in the platform’s security practices.

  1086. Scenario 1 The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platform’s security practices.

  1087. The names, email address and phone numbers of over three million hotel guests.
    Weaknesses in the platform’s security practices.

  1088. scenario 1
    The hotel chain’s reputation.
    scenario 2
    Weaknesses in the platform’s security practices

  1089. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platform’s security practices.

  1090. Scenario 1: The names, email address and phone numbers of over three million hotel guests.
    Scenario 2: Weaknesses in the platform’s security practices.

  1091. Scenario 1: The username and password of all of the hotel’s employees.
    Scenario 2: Taking advantage of student information not being correctly validated on the platform.

  1092. Scenario 1:
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2:
    Extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer.

  1093. Scenario 1
    1. The card payment information of over three million guests.

    Scenario 2
    Weaknesses in the platform’s security practices.

  1094. 1. The names, email address and phone numbers of over three million hotel guests.
    2. Weaknesses in the platform’s security practices.
    3.

  1095. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.
    Scenario 2
    Weaknesses in the platform’s security practices.

  1096. 1. The card payment information of over three million guests.
    2. Weaknesses in the platform’s security practices.

  1097. Extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer.

  1098. SCENARIO 1
    The names, email address and phone numbers of over three million hotel guests.

    The hotel chain’s reputation.

  1099. The names, email address and phone numbers of over three million hotel guests
    Weaknesses in the platform’s security practices.

  1100. SCENARIO 1
    The names, email address and phone numbers of over three million hotel guests.

    SCENARIO 2
    Bypassing the platform’s access control methods.

  1101. The names, email address and phone numbers of over three million hotel guests.

    Weaknesses in the platform’s security practices.

  1102. Case1
    The names, email address and phone numbers of over three million hotel guests.

    Case2
    Weaknesses in the platform’s security practices.

  1103. The names, email address and phone numbers of over three million hotel guests.

    Weaknesses in the platform’s security practices.

  1104. 1. The names, email address and phone numbers of over three million hotel guests.

    2. Weaknesses in the platform’s security practices.

  1105. CASE 1:
    The names, email address and phone numbers of over three million hotel guests.

    CASE 2:
    Taking advantage of student information not being correctly validated on the platform.

  1106. 1. The names, email address and phone numbers of over three million hotel guests.

    2. Weaknesses in the platform’s security practices.

  1107. 1. The names, email address and phone numbers of over three million hotel guests.

    2. Weaknesses in the platform’s security practices.

  1108. CASE 2: Weaknesses in the platform’s security practices.
    CASE 1: The card payment information of over three million guests.
    The names, email address and phone numbers of over three million hotel guests.
    The hotel chain’s reputation.

  1109. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.
    Scenario 2
    Weaknesses in the platform’s security practices

  1110. 1.The names, email address and phone numbers of over three million hotel guests.

    2.weaknesses in the platforms security practices.

  1111. SCENARIO 1
    * The hotel’s chain reputation
    * The username and password of all of the hotel’s employees
    SCENARIO 2
    * Weaknesses in the platform’s security practices.
    * Bypassing the platform’s access control methods.

  1112. Case 1
    The names, email address and phone numbers of over three million hotel guests.
    Case 2
    Weaknesses in the platform’s security practices.

  1113. CASE1;
    The username and password of all of the hotel’s employees.
    CASE2:
    Weaknesses in the platform’s security practices.

  1114. 1. The names, email address and phone numbers of over three million hotel guests.

    2.Weaknesses in the platform’s security practices.

  1115. The names, email address and phone numbers of over three million hotel guests.

    Weaknesses in the platform’s security practices.

  1116. Scenario 1:
    – The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    – Weaknesses in the platform’s security practices.

  1117. The card payment information of over three million guests.

    The names, email address and phone numbers of over three million hotel guests.

    The hotel chain’s reputation.

  1118. 1. The names, email address and phone numbers of over three million hotel guests.
    2. Weaknesses in the platform’s security practices.

  1119. Scenerio 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2:
    Weaknesses in the platform’s security practices.

  1120. Scenario 1. The card payment information of over three million guests.

    Scenario 2. Weaknesses in the platform’s security practices.

  1121. 1. The names, email address, and phone numbers of over three million hotel guests.
    2. Weaknesses in the platform’s security practices.

  1122. Scenario 1. The hotel chain’s reputation was taken.
    Scenario 2. Weaknesses in the platform’s security practices.

  1123. Scenario 1: The username and password of all of the hotel’s employees.
    Scenario 2: Weaknesses in the platform’s security practices.

  1124. Scenario 1. The hotel chain’s reputation was taken.
    Scenario 2. Weaknesses in the platform’s security practices.

  1125. SCENARIO 1
    The names, email address and phone numbers of over three million hotel guests.

    The hotel chain’s reputation.

    SCENARIO 2
    Weaknesses in the platform’s security
    practices.

    Bypassing the platform’s access control methods.

  1126. Scenario 1

    The username and password of all of the hotel’s employees.
    The names, email addresses and phone numbers of over three million hotel guests.
    The card payment information of over three million guests.

    Scenario 2

    The card payment information of over three million guests.

  1127. Scenario 1
    The hotel chain’s reputation.

    Scenario 2
    Weaknesses in the platform’s security practices.

  1128. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.
    The hotel chain’s reputation.

    Scenario 2
    Weaknesses in the platform’s security practices

  1129. Scenario 1

    The names, email address and phone numbers of over three million hotel guests

    Scenario 2

    Weaknesses in the platform’s security practices

  1130. Weaknesses in the platform’s security practices.

    The names, email address and phone numbers of over three million hotel guests.

  1131. Scenario 1

    The names, email addresses, and phone numbers of over three million hotel guests.

    Scenario 2

    Weaknesses in the platform’s security practices

  1132. 1. The names, email address and phone numbers of over three million hotel guests.

    2. Weaknesses in the platform’s security practices

  1133. Scenario 1
    The names, email address and phone numbers of over three million hotel guests

    Scenario 2
    Weaknesses in the platform’s security practices.

  1134. Question 1

    The names, email address and phone numbers of over three million hotel guests.

    Question 2

    Weaknesses in the platform’s security practices.

  1135. Scenario 1

    The names, email addresses, and phone numbers of over three million hotel guests.

    Scenario 2

    Weaknesses in the platform’s security practices

  1136. Scenario 1

    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platform’s security practices

  1137. Scenario 1:

    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2:
    Weaknesses in the platform’s security practices.

  1138. The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platform’s security practices

  1139. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platform’s security practices.

  1140. Scenario 1

    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platform’s security practices

  1141. Scenario 1

    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platform’s security practices

  1142. The username and password of all of the hotel’s employees.
    Weaknesses in the platform’s security practices.

  1143. Scenerio 1: The names, email address and phone numbers of over three million hotel guests.

    Scenerio 2: Weaknesses in the platform’s security practices.

  1144. Scenario 1.
    The names, email address and phone numbers of over three million hotel guests.
    Scenario 2. Weaknesses in the platform’s security practices.

  1145. Scenario 1

    The names, email address and phone numbers of over three million hotel guests.
    The hotel chain’s reputation

    Scenario 2
    Weaknesses in the platform’s security practices.

  1146. Scenario 1. The names, email address and phone numbers of over a million hotel guests
    Scenario 2. Extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer.

  1147. Scenario 1 The names, email address and phone numbers of over three million hotel guests.
    Scenario 2 Weaknesses in the platform’s security practices.

  1148. The names, email address and phone numbers of over three million hotel guests
    Weaknesses in the platform’s security practices.

  1149. Scenario 1: The names, email address and phone numbers of over three million hotel guests.

    The hotel chain’s reputation.
    Scenario2: Weaknesses in the platform’s security practices

  1150. Scenario 1: The names, email address and phone numbers of over three million hotel guests

    Scenario 2: Weaknesses in the platform’s security practices.

  1151. Scenario one: The names, email address and phone numbers of over three million hotel guests.
    2.Weaknesses in the platform’s security practices.

  1152. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platform’s security practices.

  1153. Scenario 1……The names, email address and phone numbers of over three million hotel guests

    Scenario 2……….×Weaknesses in the platform’s security practices.

  1154. 2.The names, email address and phone numbers of over three million hotel guests

    ×Weaknesses in the platform’s security practices.

  1155. Scenario 1
    The username and password of all of the hotel’s employees.
    scenario 2
    Weaknesses in the platform’s security practices.

  1156. Scenario 1 – The names, email address and phone numbers of over three million hotel guests

    Scenario 2 – Weakness in the platform’s security practices

  1157. The names, email address and phone numbers of over three million hotel guests

    Weaknesses in the platform’s security practices.

  1158. 1. The names, email address and phone numbers of over three million hotel guests.

    2. Weaknesses in the platform’s security practices.

  1159. The names, email address and phone numbers of over three million hotel guests.

    Weaknesses in the platform’s security practices.

  1160. scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platform’s security practices.

  1161. 1. White Hat Attakers
    2. Black hat Attackers
    3. White hat Attackers
    4. Gray hat Attackers
    5. white hat attackers

  1162. 1. The card payment information of over three million guests.

    Scenario 2
    Weaknesses in the platform’s security practices.

  1163. 1
    The names, email address and phone numbers of over three million hotel guests.

    2
    1.White Hat
    2. Black Hat
    3. White Hat
    4. Grey Hat
    5. Black Hat

  1164. The names, email address and phone numbers of over three million hotel guests.

    The names, email address and phone numbers of over three million hotel guests.

  1165. Scenario1.The card payment information of over three million guests.

    Scenario 2. Weaknesses in the platform’s security practices.

  1166. Scenario 1:The card payment information of over three million guests.

    Scenario 2:Weaknesses in the platform’s security practices.

  1167. Scenario 1. The names, email address and phone numbers of over three million hotel guests.

    Scenario 2. Weaknesses in the platform’s security practices.

  1168. Okeleji Testimony
    Day 1

    Scenario 1:
    The card payment information of over three million guests.

    Scenario 2:
    Weaknesses in the platform’s security practices.

  1169. The names, email address and phone numbers of over three million hotel guests.
    Weaknesses in the platform’s security practices.

  1170. Scenario 1:The names, email address and phone numbers of over three million hotel guests.
    Scenario 2:Weaknesses in the platform’s security practices.

  1171. Scenario 1: The names, email address and phone numbers of over three million hotel guests.
    Scenario 2: Weaknesses in the platform’s security practices.

  1172. Scenario 1
    The names, email address and phone numbers of over three million hotel guests

    Scenario 2
    Weaknesses in the platform’s security practices.

  1173. Scenario 1: The names, email address and phone numbers of over three million hotel guests.
    Scenario 2: Weaknesses in the platform’s security practices.

  1174. SCENARIO 1
    The names, email address and phone numbers of over three million hotel guests

    SCENARIO 2
    Taking advantage of student information not being correctly validated on the platform.

  1175. The names, email address and phone numbers of over three million hotel guests

    Weaknesses in the platform’s security practices.

  1176. The username and password of all of the hotel’s employees.

    Taking advantage of student information not being correctly validated on the platform.

  1177. The names, email address and phone numbers of over three million hotel guests.

    Weaknesses in the platform’s security practices.

  1178. Extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer.

  1179. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.
    Scenario 2
    Weaknesses in the platform’s security practices.

  1180. 1. The names, email address and phone numbers of over three million hotel guests.

    2. Weaknesses in the platform’s security practices.

  1181. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.
    Scenario 2
    Bypassing the platform’s access control methods.

  1182. Scenario 1

    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platform’s security practices.

  1183. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platform’s security practices.

  1184. Scenario 1.
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2.
    Weaknesses in the platform’s security practices.

  1185. Scenario 1;

    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2;

    Weaknesses in the platform’s security practices.

  1186. Scenario 1:
    The names, email address and phone numbers of over three million hotel guests.
    Scenario 2:
    Bypassing the platform’s access control methods.

  1187. Scenario 1;

    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2;

    Weaknesses in the platform’s security practices.

  1188. Scenario 2
    Weaknesses in the platform’s security practices.
    Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

  1189. Scenario 1

    The card payment information of over three million guests.

    Scenario 2
    Taking advantage of student information not being correctly validated on the platform.
     

  1190. The names, email address and phone numbers of over three million hotel guests.

    The hotel chain’s reputation.

    The username and password of all of the hotel’s employees.

  1191. The names, email address and phone numbers of over three million hotel guests.

    The hotel chain’s reputation.

    The username and password of all of the hotel’s employees.

  1192. 1. The names, email address and phone numbers of over three million hotel guests

    2. Weaknesses in the platform’s security practices

  1193. #1. The names, email address and phone numbers of over three million hotel guests

    #2. Weaknesses in the platform’s security practices

  1194. 1: Weaknesses in the platform’s security practices.
    2: The username and password of all of the hotel’s employees.

  1195. Scenario 1;

    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2;

    Weaknesses in the platform’s security practices.

  1196. scenario 1
    The names, email address and phone numbers of over three million hotel guests
    The hotel chain’s reputation.
    scenario 2
    Weaknesses in the platform’s security practices

  1197. Scenario 1 :The names, email address and phone numbers of over three million hotel guests.
    Scenario 2:Weaknesses in the platform’s security practices.

  1198. Scenario 1: The card payment information of over three million guests.

    Scenario 2: Weaknesses in the platform’s security practices.

  1199. 1. The names, email address and phone numbers of over three million hotel guests.

    2. Weaknesses in the platform’s security practices.

  1200. scenario 1
    The names, email address and phone numbers of over three million hotel guests
    scenario 2
    Weaknesses in the platform’s security practices

    1. Scenario 1
      The card payment information of over three million guests.
      The names, email address and phone numbers of over three million hotel guests.
      The hotel chain’s reputation.
      The username and password of all of the hotel’s employees.

      Scenario 2
      Weaknesses in the platform’s security practices.

  1201. Scenerio 1 it is unclear what the hackers took but only one thing is clearly taken
    The hotel chain’s reputation.

    Scenerio 2
    Weaknesses in the platform’s security practices.

  1202. Scenario 1
    The card payment information of over three million guests.

    Scenario 2
    Weaknesses in the platform’s security practices.

  1203. Scenario 1

    The names, email address and phone numbers of over three million hotel guests.

    Scenario 3
    Weaknesses in the platform’s security practices.

  1204. Scenario 1
    The names, email address and phone numbers of over three million hotel guests

    Scenario2
    Weakness in the platform’s security practices

  1205. 1. The names, email address and phone numbers of over three million hotel guests.

    2. Weaknesses in the platform’s security practices.

  1206. Scenario 2

    Bypassing the platform’s access control methods.

    Extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer.

    Weaknesses in the platform’s security practices.

  1207. Scenario 1
    The card payment information of over three million guests.

    The username and password of all of the hotel’s employees.

    The names, email address and phone numbers of over three million hotel guests.

  1208. Scenario 1
    The names, email address and phone numbers of over three million hotel guests

    Scenario2
    Weakness in the platform’s security practices

  1209. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platform’s security practices.

  1210. Day 2
    Question 1 White hat
    Question 2 Black hat
    Question 3 Gray hat
    Question 4 Gray hat
    Question 5 White hat

  1211. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platform’s security practices.

  1212. Day 1, Excercise 6, Ans:-
    1a. The card payment information of over three million guests.

    2a. Weaknesses in the platform’s security.
    2b. Bypassing the platform’s access control methods.

  1213. Scenario 1: The names, email address and phone numbers of over three million hotel guests.

    Scenario 2: Weaknesses in the platform’s security practices.

  1214. The names, email address and phone numbers of over three million hotel guests.
    Weaknesses in the platform’s security practices.

  1215. Scenario 1:
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2:
    Weaknesses in the platform’s security practices.

  1216. Day 1
    Answer for Q1
    The hotel chain’s reputation
    Answer for Q2
    Weaknesses in the platform’s security practices.

  1217. Question 1: The names, email address and phone numbers of over three million hotel guests.

    Question 2: Weaknesses in the platform’s security practices.

  1218. Day One Assignment:
    Scenario 1: The hotel chain’s reputation
    Scenario 2:Weaknesses in the platform’s security protection

    Day 2
    1. Gray Hat
    2. Black Hat
    3. White Hat
    4. Black Hat
    5. White hat

  1219. Scenario 1: The names,email address and phone numbers of over three million hotel guests.

    Scenario 2: Weakness in the platform’s security practices.

  1220. Day 2 answer: what’s the color of my hat?
    question 1 – White hat
    question 2 – Black hat
    question 3 – White hat
    question 4 – grey hat
    question 5 – White hat

  1221. Scenario 1: The names,email address and phone numbers of over three million hotel guests.

    Scenario 2: Weakness in the platform’s security practices.

  1222. Scenario 1: The names, email address and phone numbers of over three million hotel guests.
    Scenario 2: Weaknesses in the platform’s security practices.

  1223. Scenario one;
    2. The names, email address and phone numbers of over three million hotel guests.

    Scenario two;
    * Weaknesses in the platform’s security practices.

  1224. Scenario 1
    •The card payment information of over three million guests.
    •The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    •Bypassing the platform’s access control methods.

  1225. Scenerio 1 – The names, email address and phone numbers of over three million hotel guests.
    Scenerio 2 – Weeknesses in the platform’s security practices

  1226. Senerio 1
    The card payment information of over three million guests.

    Senerio 2
    Weaknesses in the platform’s security practices.

  1227. Scenario 1- The card payment information of over three million guests.

    Scenario 2- Bypassing the platform’s access control methods.

  1228. Scenario one;
    The names, email address and phone numbers of over three million hotel guests.

    Scenario two;
    Weaknesses in the platform’s security practices.

  1229. 1. The names, email address and phone numbers of over three million hotel guests.
    2. Weaknesses in the platform’s security practices.

  1230. Scenario 1: The card payment information of over three million guests.
    Scenario 2; Weaknesses in the platform’s security practices.

    1. White hat
    2. Black hat
    3. Gray hat
    4. Black hat
    5.Gray hat

  1231. 1. The names, email address and phone numbers of over three million hotel guests.
    2.Weaknesses in the platform’s security practices.

  1232. Scenario 1-The names, email address and phone numbers of over three million hotel guests
    Scenario 2-Bypassing the platform’s access control methods.

  1233. scenario 1: The username and password of all of the hotel’s employees.

    scenario 2: Taking advantage of student information not being correctly validated on the platform.

  1234. ——-The username and password of all of the hotel’s employees.

    ——— Weaknesses in the platform’s security practices.

  1235. 1. The names, email address and phone numbers of over three million hotel guests.
    2.Weaknesses in the platform’s security practices.

  1236. The names, email address and phone numbers of over three million hotel guests.

    Weaknesses in the platform’s security practices.

  1237. The card payment information of over three million guests.
    The names, email address and phone numbers of over three million hotel guests.
    Weaknesses in the platform’s security practices.

  1238. The names, email address and phone numbers of over three million hotel guests.
    Weaknesses in the platform’s security practices.

  1239. The names, email address and phone numbers of over three million hotel guests.

    Weaknesses in the platform’s security practices.

    White Hat
    Black Hat
    White Hat
    Grey Hat
    White Hat

  1240. The card payment information of over three million guests.
    The names, email address and phone numbers of over three million hotel guests.
    Weaknesses in the platform’s security practices.

  1241. 1. The names, email address and phone numbers of over three million hotel guests.
    2. Weaknesses in the platform’s security practices.

  1242. The names, email address and phone numbers of over three million hotel guests.
    Weaknesses in the platform’s security practices.

  1243. Scenario 1: The names, email address and phone numbers of over three million hotel guests
    Scenario 2: Bypassing the platform’s access control methods, Weaknesses in the platform’s security practices.

    1. Scenario 1: The names, email address and phone numbers of over three million hotel guests.

      Scenario 2: Bypassing the platform’s access control methods, Weaknesses in the platform’s security practices

      1. White hat
      2. Black hat
      3. White hat
      4. Black hat
      5. Gray hat

  1244. Cyber security: Day 2 Assignment

    Scenario 1:

    The hotel chain’s reputation.

    Scenario 2:

    Weaknesses in the platform’s security practices.

    1: Gray Hat
    2: Black Hat
    3: White Hat
    4: Black Hat
    5: White Hat

  1245. The username and password of all of the hotel’s employees.
    Weaknesses in the platform’s security practices.

  1246. Scenario 1: The hotel chain’s reputation.

    Scenario 2:Taking advantage of student information not being correctly validated on the platform.

  1247. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Senario 2
    Weaknesses in the platform’s security practices.

  1248. Scenario 1
    1. The card payment information of over three million guests.
    Senario 2
    Weaknesses in the platform’s security practices.

  1249. Scenario 1
    1. The card payment information of over three million guests.
    Senario 2
    Weaknesses in the platform’s security practices.

  1250. Scenario 1
    1. The names, email address and phone number of over 3 million hotel guests.

    Scenario 2
    2. Weakness in the platforms security practices

  1251. Scenario 1: The username and password of all of the hotel’s employees.
    Scenario 2: Weaknesses in the platform’s security practices

  1252. Weaknesses in the platform’s security practices was exploited by the hackers in obtaining important student information in the second scenario.

  1253. Scenario 1.The hotel chain’s reputation

    Scenario 2.Extracting information when the volume of student data exceeds the storage

    1. Scenario 1: The employee username and password as well as the names, email address of the customers were taken

  1254. scenario 1
    The names, email address and phone numbers of over three million hotel guests

    scenario 2
    Weaknesses in the platform’s security practices.

  1255. Scenario 1: The names, email address and phone numbers of over three million hotel guests.
    Scenario 2: Weaknesses in the platform’s security practices.

  1256. scenario 1; The names, email address and phone numbers of over three million hotel guests
    scenario 2; Weaknesses in the platform’s security practices.

  1257. Scenario 1: The username and password of all of the hotel’s employees.
    Scenario 2:Weaknesses in the platform’s security practices.

  1258. Scenario 1

    The names, email addresses, and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platform’s security practices.

  1259. Scenario 1 : The names, email address and phone numbers of over three Million hotel guests.

    Scenario 2: Weaknesses in the platforms security practices.

  1260. Scenario 1 : The names, email address and phone numbers of over three Million hotel guests.

    Scenario 2: Weaknesses in the platforms security practices.

  1261. The names, email address and phone numbers of over three million hotel guests.

    The hotel chain’s reputation.

  1262. Scenario 1: The username and password of all of the hotel’s employees.
    Scenario 2:Weaknesses in the platform’s security practices.

  1263. Scenario 1;The username and password of all of the hotel’s employees.
    Scenario 2; Weaknesses in the platform’s security practices.

  1264. SCENARIO 1;The username and password of all of the hotel’s employees.
    SCENARIO 2; Weaknesses in the platform’s security practices.

  1265. Scenario 1
    The hotel chain’s reputation

    Scenario 2
    Extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer.

  1266. The names, email address and phone numbers of over three million hotel guests.

    Weaknesses in the platform’s security practices.

  1267. Scenario 1:

    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2:

    Weaknesses in the platform’s security practices.

  1268. Scenario 1:
    3. The hotel chain’s reputation.

    Scenario 2:
    1. Weaknesses in the platform’s security practices.

  1269. Scenario 1
    The card payment information of over three million guests.
    Scenario 2
    Weaknesses in the platform’s security practices.

  1270. The names, email address and phone numbers of over three million hotel guests
    Weaknesses in the platform’s security practices

  1271. Scenario 1, The names, email address and phone numbers of over three million hotel guests.

    Scenario 2, Weaknesses in the platform’s security practices.

    1. Scenario 1

      The names, email address and phone numbers of over three million hotel guests.

      Scenario 2

      Weaknesses in the platform’s security practices.

  1272. Cyber security: Day 2 Assignment

    Scenario 1 : The hotel chain’s reputation.

    Scenario 2 : Weaknesses in the platform’s security practices.
     

  1273. Scenario 1, The names, email address and phone numbers of over three million hotel guests.

    Scenario 2, Weaknesses in the platform’s security practices.

  1274. Scenario 1. The names, email address and phone numbers of over three million hotel guests.

    Scenario 2.Weaknesses in the platform’s security practices.

  1275. Scenario 1:
    Answer: the hotel chain’s reputation

    Scenario 2:
    Answer: the hackers exploited weaknesses in the platform’s security practices

  1276. Scenario 1:
    Ans; the hotel chain’s reputation

    Scenario 2:
    Ans; the hackers exploited weaknesses in the platform’s security practices

  1277. 1. The names, email address and phone numbers of over three million hotel guests.
    2. Weaknesses in the platform’s security practices.

  1278. 1. The names, email address and phone numbers of over three million hotel guests.

    2.Weaknesses in the platform’s security practices.

  1279. 1 The card payment information of over three million guests.
    2 Weaknesses in the platform’s security practices.

  1280. Day 1 : discussion assignment
    Scenario 1
    – hotel’s chain’s reputation.
    -the names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    – weakness in the hotel’s platforms security practices

    Day 2: what colour is my hat?
    1-gray hat
    2-black hat
    3-white hat
    4-gray hat
    5-white hat

  1281. Scenerio 1- The username and password of all of the hotel’s employees.

    Scenrio 2- Weaknesses in the platform’s security practices.

  1282. Scenario 1 – The hotel chain’s reputation
    Scenario 2 –
    Weaknesses in the platform’s security practices.

  1283. Scenario 1: The names, email address and phone numbers of over three million hotel guests.
    Scenario 2: Weaknesses in the platform’s security practices.

  1284. Scenario 1: The names, email address and phone numbers of over three million hotel guests.
    Scenario 2: Weaknesses in the platform’s security practices.

  1285. Scenario 1 > The names, email address and phone numbers of over three million hotel guests.
    Scenario 2 > Weaknesses in the platform’s security practices.

  1286. Senerio one answer:names, email address and phone numbers of over three million hotel guests.

    Senerio two answer:Weaknesses in the platform’s security practices.

  1287. Scenario 1: The names, email address and phone numbers of over three million hotel guests.
    Scenario 2: Weaknesses in the platform’s security practices.

  1288. Scenario 1
    The names, the Email Address, the Phone Numbers of over three million hotel guests.

    Scenario 2
    Weakness in the platform’s security practices.

  1289. The names, email address and phone numbers of over three million hotel guests.
    Weaknesses in the platform’s security practices.

  1290. Scenario 1:The names, email address and phone numbers of over three million hotel guests.

    Scenario 2: Weaknesses in the platform’s security practices.

  1291. The card payment information of over three million guests.

    Bypassing the platform’s access control methods.

  1292. The names, email address and phone numbers of over three million hotel guests

    Taking advantage of student information not being correctly validated on the platform.

  1293. Scenario 1
    The names, email address and phone numbers of over three million hotel guests

    Scenario 2
    Weaknesses in the platform’s security practices

  1294. The card payment information of over three million guests
    The hotel chain’s reputation.
    Weaknesses in the platform’s security practices

  1295. DAY 1

    1. The names, email address and phone numbers of over three million hotel guests.

    2. Weaknesses in the platform’s security practices

  1296. Scenario 1: The names, email address and phone numbers of over three million hotel guests.
    Scenario 2: Weaknesses in the platform’s security practices.

  1297. Scenario 1: The names, email address and phone numbers of over three million hotel guests.
    Scenario 2: Weaknesses in the platform’s security practices.

  1298. scenario 1: The names, email address and phone numbers of over three million hotel guests

    scenario 2: Weaknesses in the platform’s security practices.

  1299. Scenario 1 – The names, email address and phone numbers of over three million hotel guests.

    Scenario 2 – Weaknesses in the platform’s security practices.

  1300. 1) The names, email address and phone numbers of over three million hotel guests.

    2) Bypassing the platform’s access control methods.

    3)

  1301. Scenario 1

    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platform’s security practices.

  1302. MODULE 1 ASSIGNMENT

    Scenario 1
    ANSWER: The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    ANSWER: Bypassing the platform’s access control methods.

  1303. day 1

    1. The names, email address and phone numbers of over three million hotel guests.

    2. Weaknesses in the platform’s security practices.

  1304. In scenerio 1, the names, emails and phone numbers, and payment details of every of their customer was taken and if the information is used it would cost the hotel their reputation.

    In scenerio 2, the hackers exploited the weakness in the platforms security practices.

  1305. Scenerio 1. The names, email address and phone numbers of over three million hotel guests.
    Scenario 2. Weaknesses in the platform’s security practices.

  1306. Scenario 1:
    *The hotel chain’s reputation.
    *The names, email address and phone numbers of over three million hotel guests

    Scenario 2:
    *Weaknesses in the platform’s security practices

  1307. Scenerio 1. The names, email address and phone numbers of over three million hotel guests.
    Scenario 2. Weaknesses in the platform’s security practices.

  1308. In scenario 1. The names, email address and phone numbers of over three million hotel guests.

    Scenario 2. Weaknesses in the platform’s security practices.

  1309. Question 1. The names, email address and phone numbers of over three million hotel guests
    Question 2, Bypassing the platform’s access control methods.

  1310. ASSIGNMENT 2
    1. Gray Hat Attacker
    2. White Hat Attacker
    3. Black Hat Attacker
    4. Black Hat Attacker
    5. White Hat Attacker

  1311. In scenerio 1, the names, emails and phone numbers, and payment details of every of their customer was taken and if the information is used it would cost the hotel their reputation.

    In scenerio 2, the hackers exploited the weakness in the platforms security practices.

  1312. Q1.The names, email address and phone numbers of over three million hotel guests.
    Q2. Weaknesses in the platform’s security practices.

  1313. ASSIGNMENT 2
    1. White Hat Attacker
    2. Black Hat Attacker
    3. White Hat Attacker
    4. Gray Hat Attacker
    5. White Hat Attacker

  1314. Scenario 1:
    1. The card payment information of over three million guests
    2. The names, email address and phone numbers of over three million hotel guests
    3. The hotel chain’s reputation
    Scenario 2:
    . Weaknesses in the platform’s security practices.

  1315. In scenerio 1, the names, emails and phone numbers, and payment details of every of their customer was taken and if the information is used it would cost the hotel their reputation.

    In scenerio 2, the hackers exploited the weakness in the platforms security practices.

  1316. Scenarios 1: The names, email address and phone numbers of over three million hotel guests.
    Scenarios 2: Weaknesses in the platform’s security practices.

  1317. In scenerio 1, the names, emails and phone numbers, and payment details of every of their customer was taken and if the information is used it would cost the hotel their reputation.

    In scenerio 2, the hackers exploited the weakness in the platforms security practices.

  1318. In the first scenario, the hackers took the names, email addresses, and phone numbers of over three million hotel guests.

    In the second scenario, the hackers gained access to the personal data of millions of students, including their full names, email addresses, phone numbers, and school enrollment details.

  1319. In Scenario 1, it is safe to say the hackers took all the options. The names, email address and phone numbers of all the guests; probably not all customers card payment information as some might have paid via cash, but for most customers especially in this e-payment oriented times. the hotel’s reputation too is being questioned and access to an employee’s username and password implies others might have been compromised.

    For Scenario 2, it is clear that the hackers used the weakness in the platform’s security practices to gain access to valuable personal information of the students due to its exposure on a publicly accessible cloud database without an access control method.

  1320. Senerio one
    The security took the name, email and phone number of the customer from the hotel site.
    Senerio two
    Weakness in the platform security.

  1321. 1.The names, email address and phone numbers of over three million hotel guests.
    2. The hotel chain’s reputation.
    3. Weaknesses in the platform’s security practices.

  1322. Scenerio 1:
    The names, email address and phone numbers of over three million hotel guests

    Scenerio 2:
    Bypassing the platform’s access control methods.

  1323. Scenario 1: The hotel chain’s reputation was taken

    Scenario 2: Weaknesses in the platform’s security practices was exploited

  1324. Scenario 1: The card payment information of over three million guests.

    The names, email address and phone numbers of over three million hotel guests.

    The hotel chain’s reputation.
    The username and password of all of the hotel’s employees.

    Scenario 2: Weaknesses in the platforms security practices.

  1325. Scenario 1

    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2

    Weaknesses in the platform’s security practices.

  1326. Scenario 1
    The names,email addresses and phone numbers
    Scenario 2
    Weaknesses in the platform security practices

  1327. Scenario 1

    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2

    Weaknesses in the platform’s security practices.

  1328. The names, email address and phone numbers of over three million hotel guests.

    Weaknesses in the platform’s security practices.

  1329. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platform’s security practices.

    1. Scenario 1 :
      The names, email address and phone numbers of over three million hotel guests

      Scenario 2:
      The weakness in the platform’s security practices.

  1330. Scenario 1
    The hotels reputation
    The username and password of the hotel employees
    Scenario 2
    Weakness in the platform securities

  1331. These are my submission.

    Scenario 1:
    What did the hackers take?

    The card payment information of over three million guests.
    The names, email address and phone numbers of over three million hotel guests.
    The hotel chain’s reputation.
    The username and password of all of the hotel’s employees.

    Scenario 2:
    What exploits did the hackers use to gain access to valuable personal information?

    Weaknesses in the platform’s security practices.

  1332. In Scenario 1:
    What did the hackers take?

    The names, email address, and phone numbers of over three million hotel guests.
    In Scenario 2:
    What exploits did the hackers use to gain access to valuable personal information?

    Weaknesses in the platform’s security practices.

  1333. Scenario 1
    Security breaches today are all too common, with attackers constantly finding new and innovative ways of infiltrating organizations in search of valuable information.

    Scroll down to read the latest breaking security news headline.
    What Happened?

    According to our sources, a well known hotel chain that operates across the world has reported a massive data breach, with the personal information of over three million guests exposed to hackers.

    The hotel discovered that hackers gained access to its customer database by using the login details of one of its employees.

    At this point, the hotel doesn’t believe that the hackers were able to access any account passwords or financial information. Recent guests are encouraged to check the hotel chain’s web portal to see if they have been impacted by this breach.

    *This is a fictional scenario.

    This is a multiple choice question. Once you have selected an option, select the submit button below to submit your answer.

    In this example, what did the hackers take?

    Select the correct answer, then Submit.
    The card payment information of over three million guests.
    The names, email address and phone numbers of over three million hotel guests.
    The hotel chain’s reputation.
    The username and password of all of the hotel’s employees.
    Scenario 2
    eLearning Platforms at Risk!

    The team at DEXA is concerned. eLearning platforms are becoming prime targets for attackers as more and more organizations make the move to digital learning.

    SCROLL down to find out more about a recent case.*

    A popular online training platform admitted leaving the personal data of millions of its students (many of them minors) exposed on a publicly accessible cloud database.

    Hackers were able to directly access students’ full names, email addresses, phone numbers, and school enrollment details from the Internet!

    While it’s unclear what the hackers have done with this acquired information, it’s safe to say that they have everything they need to carry out widespread phishing or malware attacks.

    What Exploits?
    What exploits did the hackers use in this case to gain access to valuable personal information?

    Select the correct answer, then Submit.
    Weaknesses in the platform’s security practices.
    Extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer.
    Bypassing the platform’s access control methods.
    Taking advantage of student information not being correctly validated on the platform.
    Post
    ChatGPT
    In Scenario 1:
    What did the hackers take?

    The names, email address, and phone numbers of over three million hotel guests.
    In Scenario 2:
    What exploits did the hackers use to gain access to valuable personal information?

    Weaknesses in the platform’s security practices.

    1. Question 1 – white hat
      Question 2 – black hat
      Question 3 – gray hat
      Question 4 – black hat
      Question 5 – white hat

  1334. Scenario 1
    The Hotel chain reputation
    The name, email address and phone numbers of over 3 million hotel guests

    Scenario 2
    Weakness in the platform security practices

  1335. Hello Support Team,

    These scenarios and the answers or options are not selectable in Day 1 Task.

    Please, kindly assist with rectifying these issues

  1336. Day 1 assessment
    Scenario 1
    The names,email address and phone numbers of over 3million hotel guest
    Scenario 2
    Weakness in the platform security practices

  1337. Day 1. Assessment:
    Scenario I- The names, Email address and phone numbers of over three million hotel guests.

    Scenario II – weaknesses in the platform’s security practices.

  1338. Scenario 1- The names, email address and phone numbers of over three million hotel guests

    Scenario 2- weaknesses in the platform’s security practice

  1339. Day 1 Assessment:
    Scenario I- The names, Email address and phone numbers of over three million hotel guests.

    Scenario II – weaknesses in the platform’s security practices.

  1340. Day 1 Assessment:
    Scenario 1. The names, Email address and phone numbers of over three million hotel guests.

    Scenario 2. weaknesses in the platform’s security practices.

  1341. Day 1 assignment;
    Scenario one : The hotel’s reputation
    Scenario two:weakness in the platform security practise

  1342. Day one assignment:
    Scenario 1: The names, email address and phone numbers of over three million hotel guests.
    Scenario 2: Weaknesses in the platform’s security practices.

  1343. Day 1 assignment

    Scenario 1: The names, email address and phone numbers of over three million hotel guests.

    Scenario 2: Weaknesses in the platform’s security practices.

  1344. Day 1 Assignment;
    Answers to the Questions
    Scenario 1: The name, email address and phone numbers of over 3million hotel guests.

    Scenario 2; Weakness in the platform’s security practices.

  1345. Day one assignment

    Scenario 1: The hotel chain’s reputation
    Scenario 2:Weaknesses in the platform’s security protection

  1346. Day One Assignment:

    Scenario 1: The hotel chain’s reputation
    Scenario 2:Weaknesses in the platform’s security protection

  1347. Cyber Security: Day 1 Assignment

    Scenario 1: The names, email address and phone numbers of over three million hotel guests.
    Scenario 2: Weaknesses in the platform’s security practices.

    Cyber Security: Day 2 Assignment

    White hat
    Black hat
    White hat
    Black hat
    Gray hat

  1348. Ans 1. Names, Email addresses, and Phone numbers of 3 million + hotel guests

    Ans 2. Weakness in the Platforms Security practices

  1349. Ans 1. Names, Email addresses, and Phone numbers of 3 million + hotel guests

    Ans 2. Weakness in the Platforms Security practices

  1350. Scenario 1: The names, email address, and phone numbers of over three million hotel guests.
    Scenario 2: Weaknesses in the platform’s security practices.

  1351. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.
    The card payment information of over three million guests.
    Scenario 2
    Weaknesses in the platform’s security practices.

  1352. 1. The names,email address and phone numbers of over 3 million hotel guests.

    2. Weakness in the platforms security practices.

  1353. Ans 1. Names, Email addresses, and Phone numbers of 3 million + hotel guests

    Ans 2. Weakness in the Platforms Security practices

  1354. scenario 1

    3. The hotel chain’s reputation

    scenario 2

    1. Weaknesses in the platform’s security practices.

  1355. 1. Names, Email addresses, and Phone numbers of 3 million + hotel guests

    2. Weakness in the Platforms Security practices

  1356. 1.The names, email address and phone numbers of over three million hotel guests

    2.Weaknesses in the platform’s security practices.

  1357. Scenario 1 : The hotel chain’s reputation
    Scenario 2 : Taking advantage of student information not being correctly validated on the platform.

  1358. Sunday Nathaniel Ngwamah
    Scenario 1:
    3. The hotel chain’s reputation.

    Scenario 2:
    Weaknesses in the platform’s security practices

  1359. Day 1
    1. The names, email address and phone numbers of the hotel guests
    2. Weakness in the platform’s security practices

  1360. 1.The names, email address and phone numbers of over three million hotel guests

    2.Weaknesses in the platform’s security practices

  1361. Scenerio 1: The names,email address and phone numbers of over 3 million hotel guests and the card payment information of over 3 million guests

    Scenerio 2: Weakness in the platforms security practices and extracting information when the volume of the students data exceeds the storage capacity of the platforms memory buffer

  1362. 1.The names, email address and phone numbers of over three million hotel guests

    2.Weaknesses in the platform’s security practices

  1363. 1.DAY 1
    Scenerio 1: The names, email address and phone numbers of over three million hotel guests.
    Scenario 2: Weaknesses in the platform’s security practices.

  1364. DAY 1
    Scenario 1: The names, email address and phone numbers of over three million hotel guests.

    Scenario 2: Weaknesses in the platform’s security practices.

  1365. DAY 1
    Scenerio 1: The names, email address and phone numbers of over three million hotel guests.

    Scenerio 2: Weaknesses in the platform’s security practices.

  1366. Day 1
    Scenerio 1

    The names, email address and phone numbers of over three million hotel guests.
    Scenerio 2

    Weaknesses in the platform’s security practices.

  1367. DAY 1
    Scenerio 1: The names, email address and phone numbers of over three million hotel guests.

    Scenerio 2: Weaknesses in the platform’s security practices.

  1368. DAY1

    Scenario 1: The card payment information of over three million guests.

    Scenario 2: Weaknesses in the platform’s security practices.

  1369. Scenario 1. The names, email address and phone numbers of over three million hotel guests.

    Scenario 2.Weaknesses in the platform’s security practices.

  1370. Scenario 1, The Hotels’ reputation was tarnished. the hackers took and manipulated the guest’s personal information such, names, address, phone number.

    Scenario 2, Shows there’s vulnerability in the security practice of the hotel which the hacker explored to carry out their illegal act.

  1371. The exploit used by the hackers in this case is the “Weaknesses in the platform’s security practices”.

  1372. Discussion assignment
    Scenario 1
    The hotel chains reputation

    Scenario 2
    Weaknesses in the platform’s security practices.

  1373. DAY 1
    SCENARIO 1
    [ 2] The hackers took the name, email address and phone numbers of over three million hotel guests.

    SCENARIO 2
    Weakness in the platforms security practices .

    1. Scenerio 1

      The hackers took the name, email address and phone numbers of over three million hotel guests.

      SCENARIO 2
      The exploit used by the hackers in this case is the “Weaknesses in the platform’s security practices”.

  1374. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.
    Scenario 2
    Weaknesses in the platform’s security practice

  1375. Scenario 1: The card payment information of over three million guests.

    Scenario 2: Weaknesses in the platform’s security practices.

  1376. Scenario 1, The names, email address and phone numbers of over three million hotel guests

    Scenario 2, Weaknesses in the platform’s security practices.

  1377. No 1.
    The username and password of all of the hotel’s employees.
    No2.
    Weaknesses in the platform’s security practices.

  1378. 1. White hat attacker
    2. Black hat attacker
    3. White hat attacker
    4. Gray hat attacker
    5. White hat attacker

  1379. Scenario 1: The username and password of all of the hotel’s employees

    Scenario 2: Weaknesses in the platform’s security practices

  1380. Scenario 1 : The hotel chain’s reputation.

    Scenario 2 : Weaknesses in the platform’s security practices.

  1381. Scenario 1: [3] The hotel chain’s reputation.

    Scenario 2: [1] Weaknesses in the platform’s security practices.

  1382. Scenario 1
    The hacker have access to the names, email address and phone numbers of over three million hotel guests.
    Scenario 2
    Weaknesses in the platform’s security practices

  1383. scenario 1
    The card payment information of over three million guests.
    The names, email address and phone numbers of over three million hotel guests.
    The hotel chain’s reputation.
    The username and password of all of the hotel’s employees.
    Scenario 2
    Weaknesses in the platform’s security practices.

  1384. Scenero 1: the names,emails and phone numbers of over 3million hotel guests.

    Scenero 2: this is due to weaknesses in the platform’s security practices.

  1385. Scenario One
    The names, email address and phone numbers of over three million hotel guests.

    Scenario Two
    Weaknesses in the platform’s security practices.

  1386. Scenario One
    The names, email address and phone numbers of over three million hotel guests.

    Scenario Two
    Weaknesses in the platform’s security practices.

  1387. Scenario 1- The card payment information of over three million guests.

    Scenario 2- Weaknesses in the platform’s security practices.

  1388. Scenario One,

    The pII of the hotel customers which are over three milllion were stolen. That is, the name, email address, and phone number

    Scenario 2.

    This is due to weaknesses in the company security practices

  1389. Scenario 1.
    The hacker gain access through one of the staff and take information of guests of over 3millions such as Email, phone number, Full names…
    Scenario 2.
    The e-learning site expose their students to the cloud without security measure and authentication because they don’t have enough cloud storage and good Cyber security consultant.

  1390. Scenerio 1:
    The card payment information of over three million guests.
    The hotel chain’s reputation.
    The username and password of all of the hotel’s employees.
    The names, email address and phone numbers of over three million hotel guests.

    Scenerio 2:
    Weaknesses in the platform’s security practices.
    Bypassing the platform’s access control methods.

  1391. Answer
    1. The user name and password of all the employees
    2. Weakness in the platform’s security practice

  1392. Scenario 1
    They took the names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    They exploited the weaknesses in the platform’s security practices.

  1393. Scenario 1: The names, email address and phone numbers of over three million hotel guests.
    Scenario 2: Weaknesses in the platform’s security practices.

  1394. first one
    The names, email address and phone numbers of over three million hotel guests

    second

    Weaknesses in the platform’s security practices

  1395. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platform’s security practices

  1396. First one
    The names, email address and phone numbers of over three million hotel guests.

    Second one Weaknesses in the platform’s security practices

  1397. 1)The names, email address and phone numbers of over three milloin hotel guests
    2)Weaknesses in the platform’s security practices.

    1. Scenario 1 -The names, email address and phone numbers of over three million hotel guests.

      Scenario 2- Weaknesses in the platform’s security practices.

  1398. Scenario 1 -The names, email address and phone numbers of over three million hotel guests.

    Scenario 2- Weaknesses in the platform’s security practices.

  1399. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.
    Scenario 2
    Weakness in the platform’s security practices.
    Bypassing the platform’s access control methods.

  1400. Scenario 1 :
    2. The names, email address and phone numbers of over three million hotel guests.

    Scenario 2:
    1. Weaknesses in the platform’s security practices.

  1401. Scenario 1:
    2. The names, email address and phone numbers of over three million hotel guests.

    Scenario 2:
    1. Weaknesses in the platform’s security practices.

  1402. Scenario 1:
    The Names, email addresses and phone numbers of over 3 million hotel guests.

    Scenario 2:
    Weakness in the platform’s security practices

  1403. Scenario 1 answer:
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2 answer:
    Weakness in the platform’s security practices.

  1404. Scenario 1:
    The card payment information of over three million guests.
    The names, email address and phone numbers of over three million hotel guests.
    The username and password of all of the hotel’s employees.

    Scenario 2:
    Weakness in the platform’s security practices.
    Bypassing the platform’s access control methods.

    1. Scenario one:
      1.The card payment information of over three million guests.
      2. The names, email address and phone numbers of over three million hotel guests.
      3. The hotel chain’s reputation.

      Scenario two:
      1. Weaknesses in the platform’s security practices.
      2. Extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer.
      3. Bypassing the platform’s access control methods.

  1405. Scenario 1 3. The hotel chain’s reputation.

    Scenario 2 Weaknesses in the platform’s security practices.

  1406. scenario 1: The hotel chain’s reputation. The username and password of all of the hotel’s employees.
    scenario 2: Weakness in the platform’s security practices. Bypassing the platform’s access control methods.

  1407. Scenario 1 -The names, email address and phone numbers of over three million hotel guests.

    Scenario 2- Weaknesses in the platform’s security practices.

  1408. 1.
    The card payment information of over three million guests.
    The names, email address and phone numbers of over three million hotel guests.

    2.
    Weaknesses in the platform’s security practices.

  1409. scenario 1 – 3, the hotels chain reputation
    scenario 2 –1, weakness in the platform’s security practices

  1410. Scenario 1 :The names, email address and phone numbers of over three million hotel guest
    Scenario 2: Weaknesses in the platform’s security practices

  1411. Scenario1
    The card payment information of over three million guest

    Scenario2
    The weaknesses in the platform’s security practice

  1412. scenario 1 – 3 the names, phone number and email address of over three million hotel guest
    scenario 2 – weakness in the platform’s security practices

  1413. Scenario 1.The names, email address and phone numbers of over three million hotel guests.
    The hotel chain’s reputation.

    Scenario 2: Weaknesses in the platform’s security practices.

  1414. Scenario 1:
    The card payment information of over three million guests.

    Scenario 2:Weaknesses in the platform’s security practices.

  1415. Scenario 1 :The names, email address and phone numbers of over three million hotel guest
    Scenario 2: Weaknesses in the platform’s security practices

  1416. Scenario 1; 3- The hotel chain’s reputation

    Scenario 2 : weakness in the platform ‘s security practices

  1417. Scenario 1 :The names, email address and phone numbers of over three million hotel guest
    Scenario 2: Weaknesses in the platform’s security practices

  1418. Scenario 1: The harkers gained access to the names, email address and phone numbers of over three million hotel guests.

    Scenario 2: The harkers exploited the weaknesses in the platform’s security practices.

  1419. Scenario 1 :The names, email address and phone numbers of over three million hotel guest

    Scenario 2: Weaknesses in the platform’s security practices

  1420. 1. The card payment information of over three million guests.

    2. Weaknesses in the platform’s security practices.

  1421. Answers

    Scenario 1: The names, email address and phone numbers of over three million hotel guests

    Scenario 2: Weaknesses in the platform’s security practices

  1422. Scenario 1; 3- The hotel chain’s reputation

    Scenario 2 : weakness in the platform ‘s security practices

  1423. Answers

    Scenario 1: The names, email address and phone numbers of over three million hotel guests

    Scenario 2: Weaknesses in the platform’s security practices

  1424. Scenario 1:The names, email address and phone numbers of over three million hotel guests.
    Scenario 2:Taking advantage of student information not being correctly validated on the platform.

  1425. scenario one: The card payment information of over three million guests.
    2: Weaknesses in the platform’s security practices

  1426. Scenario 1:
    1. The names, email addresses, and phone numbers of over three million hotel guests.
    2. Hotel chain reputation

    Scenario 2
    1. Weaknesses in the platform’s security practices

  1427. 1. The names, email address and phone numbers of over three million hotel guests.
    2. Weaknesses in the platform’s security practices.

  1428. 1. The card payment information of over three million guests.

    2. Weaknesses in the platform’s security practices.

  1429. Scenario 1
    The card payment information of over three million guests

    Scenario 2
    Weaknesses in the platform’s security practices.

  1430. 1. the names, email address and phone numbers of over three million hotel guests.

    2. weaknesses in the platform’s security practices

  1431. 1. The card payment information of over three million guests because the card information contained, the full name, address, phone number..

    2. Weaknesses in the platform’s security practices.

  1432. 1. The card payment information of over three million guests.

    2. Weaknesses in the platform’s security practices.

    1. Scenario 1
      a) the card payment information of over three million guest
      b)the names ,email addresses and phone numbers of over three million hotel guest
      Scenario 2
      a) weakness in the platform security practices
      b)by passing the platform’s access control methods

  1433. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    The hotel chain’s reputation.
    Scenario 2
    Weaknesses in the platform’s security practices.

    Taking advantage of student information not being correctly validated on the platform.

    1. The names, email address and phone numbers of over three million hotel guests
      Weaknesses in the platform’s security practices.

  1434. scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platform’s security practices.

  1435. Scenario 1
    The card payment information of over three million guests.

    Scenario 2
    Weaknesses in the platform’s security practices.

  1436. Scenario 1:
    The hackers took the names, email addresses and phone numbers of over three million hotel guests, also damaged the reputation of the hotel as prospective clients will belief their personal details are not safe with the hotel.

    Scenario 2:
    The exploits the hackers used are the weaknesses in the platform’s security practices, as well as extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer

  1437. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platform’s security practices.

  1438. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platform’s security practices.

  1439. Scenario 1
    The card payment information of over three million guests.

    Scenario 2
    Weaknesses in the platform’s security practices

  1440. 1. The card payments information of over three million guests

    2. Weaknesses in the platform security practice

  1441. Scenario 1
    The hackers took the hotel’s chain reputation.

    Scenario 2
    Taking advantage of student information not being correctly validated on the platform.

  1442. The name email address and phone number of the over three million guest

    Weakness in the platform security practices

  1443. 1.Scenario 1The hackers took the names, email address and phone numbers of over three million hotel guests. And also the hotels chain reputation.
    2. Scenario 2 , The hackers used the weaknesses in the platform’s security practices.

  1444. scenario 1: The harkers where able to access the names, email address and phone numbers of over three million hotel guests.

    Scenario 2: Weaknesses in the platform’s security practices.

  1445. 1. The hotel chain’s reputation has been stolen most importantly.
    2. Weaknesses in the platform’s security practices.

  1446. Scenario 1:
    The hackers took the names, email address and phone numbers of over three million hotel guests while also damaging the reputation of the hotel, as prospective clients will belief their personal detail is not safe with the hotel.

    Scenario 2:
    The exploits the hackers used are Weaknesses in the platform’s security practices, as well as Extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer.

  1447. 1. Weaknesses in the platform’s security practices.
    2. Bypassing the platform’s access control methods.
    3. Taking advantage of student information not being correctly validated on the platform.

  1448. 1. The card payment information of over three million guests.
    2. The names, email address and phone numbers of over three million hotel guests.
    3. The username and password of all of the hotel’s employees.

  1449. Scenario 1:

    The hackers took the names, email address and phone numbers of over three million hotel guests. They also damaged the reputation of the hotel, as prospective clients will be skeptical about how safe their personal detail is with the hotel.

    Scenario 2:

    The exploits the hackers used are Weaknesses in the platform’s security practices, as well as Extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer.

  1450. 1. The names, email address and phone numbers of over three million hotel guests.
    2. Weaknesses in the platform’s security practices.

  1451. 1: The names, email addresses, and phone numbers of over three million hotel guests.
    2: Taking advantage of student information not being correctly validated on the platform

  1452. 1. The names, email address and phone numbers of over three million hotel guests

    2. Weaknesses in the platform security

  1453. In the first case scenario, the hackers took the names, emails, and other data of the hotel guests.

    Second case scenario, the exploited the weakness of the school database security.

  1454. The names, email address and phone numbers of over three million hotel guests.

    Weaknesses in the platform’s security practices.

  1455. Scenario 1
    The Card payment information of over three Million guests.

    Scenario 2
    Weakness in the platform’s security practice.

  1456. 1. The names, email address and phone numbers of over three million hotel guests.
    2. Weaknesses in the platform’s security practices.

  1457. 1. The names, email address and phone numbers of over three million hotel guests.

    2.Weaknesses in the platform’s security practices.

  1458. 1. The names, email address and phone numbers of over three million hotel guests.

    2. Weaknesses in the platform’s security practices.

  1459. Scenario 1: The names, email address and phone numbers of over three million hotel guests.
    Scenario 2: Weakness in the platform security practices.

  1460. 1 The names, email address and phone numbers of over three million hotel guests.
    2 Weaknesses in the platform’s security practices.

  1461. Scenario 1
    The card payment information of over three million guest

    Scenario 2
    Weakness in the platform’s security practices

  1462. Scenario 1:
    Ans: 2. The names, email address and phone numbers of over three million hotel guests.
    Scenario 2:
    Ans: Weaknesses in the platform’s security practices.

  1463. Scenerio 1 :
    2. The name , email address and phone number of over three million hotel guests.
    Scenerio 2: weakness in the platform’s security practice

  1464. scenerio 1: The names, email address and phone numbers of over three million hotel guests.
    Scenerio 2: Weaknesses in the platform’s security practices.

  1465. Scenario 1: The names, email address and phone numbers of over three million hotel guests.
    The hotel chain’s reputation.
    Scenario 2: Weaknesses in the platform’s security practices.

  1466. Scenario 1: The names, email address and phone numbers of over three million hotel guests.
    The hotel chain’s reputation.

    Scenario 2: Weaknesses in the platform’s security practices.

  1467. Good day Dexa and the Instructors team. The module 1 is quite an eye opener. However, I wasn’t able select answers and submit same in the Assignment section.

    For Scenario 1.
    The names, email address and phone numbers of over three million hotel guests.
    The hotel chain’s reputation.
    The username and password of all of the hotel’s employees.

    For Scenario 2.

    Weaknesses in the platform’s security practices.

    Taking advantage of student information not being correctly validated on the platform.

    Bypassing the platform’s access control methods.

  1468. Good day Dexa and the Instructors team. The module 1 is quite an eye opener. However, I wasn’t able select answers and submit same in the Assignment section.

  1469. 1 The names, email address and phone numbers of over three million hotel guests.
    2 Weaknesses in the platform’s security practices.

  1470. Scenario 1:

    The hackers took the names, email address and phone numbers of over three million hotel guests.

    Scenario 2:
    Weaknesses in the platform’s security practices.

  1471. Scenario 1:The names, email address and phone numbers of over three million hotel guests.

    Scenario 2: Weaknesses in the platform’s security practices.

  1472. Scenario 1: The hackers were able to take the names email addresses and phone numbers of over three million hotel guests
    Scenario 2: weaknesses in the platform security practices

  1473. In scenario 1:Hotel Chain Reputation, the personal details of the guests can be used for unauthorized operations.

    In scenario 2: the hacker use weaknesses in platform’s security service

  1474. Scenario 1: The names, email address and phone numbers of over three million hotel guests and The hotel chain’s reputation.

    Scenario 2: Weaknesses in the platform’s security practices and Taking advantage of student information not being correctly validated on the platform.

  1475. 1. Hotel Chain Reputation, the guests’ personal details which can be used for unauthorized operations.
    2. Weaknesses in the platform’s security practices.

  1476. Scenario one : The names, email address and phone numbers of over three million hotel guests.

    Scenario 2: Weaknesses in the platform’s security practices

  1477. Scenario1: The username and password of all of the hotel’s employees.
    Scenario 2: Taking advantage of student information not being correctly validated on the platform.

  1478. 1. Hotel Chain Reputation, the personal details of the guests which can be used for unauthorized operations.
    2.Weaknesses in the platform’s security practices.

  1479. Scenerio 1. The hackers were able to take the names, email address and phone numbers of over three million hotel guests. Scenerio 2. Weaknesses in the platform’s security practices.

  1480. Scenario 1: The names, email address and phone numbers of over three million hotel guests.
    Scenario 2: Weaknesses in the platform’s security practices.

  1481. Scenario 1: the names, email addresses and phone numbers of over 3 million hotel guests.

    Scenario 2: Weakness in the platform’s security practices

    1. Scenario 1: The names, email address and phone numbers of over three million hotel guests.

      Scenario 2: Weaknesses in the platform’s security practices.

  1482. Scenario 1:
    2. The name, email address, phone numbers of over 3 million hotel guests.

    Scenario 2:
    1. Weakness in the platform’s security practices.

  1483. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platform’s security practices.

  1484. Scenario 1: The names, email address and phone numbers of over three million hotel guests.
    Scenario 2: Weaknesses in the platform’s security practices.

  1485. Scenario 1: The hackers took the names, email address and phone numbers of over three million hotel guests.

    Scenario 2: The hackers uses the weaknesses in the platform’s security practices.

    1. SCENARIO 1: The hacker took names, email address and phone numbers of over three million hotel guests.
      SCENARIO 2: The hacker used weaknesses in the platform’s security practices.

  1486. In scenarios such as this, Once hackers get access into the hotel all data and resources are been exposed already

  1487. Scenario 1: The hackers takes, The names, email addresses, phone numbers of over 3 million hotel guest

    Scenario 2: Weaknesses in the platform’s security practices

  1488. Scenario 1:
    The names, email addresses and phone numbers of over three million hotel guests.
    Scenario 2:
    Weaknesses in the platform’s security practices.

  1489. 1. The names, email address and phone numbers of over three million hotel guests.

    2.Extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer

  1490. Scenario 1 the answer is option 2.

    Scenario 2 the answer is taking advantage of student information not being correctly validated on the platform.
    Related

  1491. 1. The names, email address and phone numbers of over three million hotel guests.

    2. Weaknesses in the platform’s security practices.

  1492. first one was the names,email addresses,and phone numbers of over three million hotel guest
    second part Weaknesses in the platform’s security practices

  1493. In the first Scenario, the names, email address and phone number of over three million hotel guests was taken. It is true that the reputation of the hotel has been affected, but on a larger scale, what appeals most to the attacker is the data of the guests he is able to get. What he is able to get doesnt just make the guest vulnerable, it also gives the attacker more options to carry our further attacks.

    In the Second scenario, it was obvious that the platform had weak security practices which allowed the attacker to have access to so many details.

  1494. Scenario 1:
    The names, email addresses and phone numbers of over three million hotel guests.
    Scenario 2:
    Weaknesses in the platform’s security practices.

  1495. Scenario one.
    The name and email address ,phone number of over 3million hotel guest.
    Scenario two:
    Weakness in the platform security practise

  1496. Scenario 1:
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2:
    Weaknesses in the platform’s security practices.

  1497. Scenario one:

    1. The card payment information of over three million guests.
    2. The hotel chain’s reputation.
    3. The names, email address and phone numbers of over three million hotel guests.

    Scenario two:
    1. Weaknesses in the platform’s security practices.

  1498. The names, email address and phone numbers of over three million hotel guests.
    Weaknesses in the platform’s security practices.

    1. Scenario 1
      The card payment information of over three million guests.

      Scenario 2
      Weaknesses in the platform’s security practices

  1499. Scenario One: The names, email address and phone numbers of over three million hotel guests.
    Scenario Two: Weakness in the platform’s security practices.

  1500. Scenario 1:
    The names, email address and phone numbers of over three million hotel guests.
    Scenario 2:
    Weaknesses in the platform’s security practices.

  1501. (Scenerion 1)The names, email addresses, and phone numbers of over three million hotel guests.
    (Scenario 2) Weaknesses in the platform’s security practices.

  1502. Scenario 1: The names, email address and phone numbers of over three million hotel guests.
    Scenario 2: Weaknesses in the platform’s security practices.

    1. Scenario 1:
      The names, email address and phone numbers of over three million hotel guests.
      Scenario 2:
      Weaknesses in the platform’s security practices.

  1503. (1)The names, email address and phone numbers of over three million hotel guests.
    (2) Weaknesses in the platform’s security practices.

  1504. Scenario one
    The names, email address and phone numbers of over three million hotel guests
    scenario two
    Weaknesses in the platform’s security practices.

  1505. Scenario 1
    2.The names, email address and phone numbers of over three million hotel guests.
    and
    3. The hotel chain’s reputation.

    Scenario 2
    .Weaknesses in the platform’s security practices.

  1506. Scenario ONE: The names, email address and phone numbers of over three million hotel guests.
    Scenario TWO: Weakness in the platform’s security practices.

  1507. scenario 1.

    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2,

    Weaknesses in the platform’s security practices.

  1508. Scenario 1
    The names, email address and phone numbers of over three million hotel

    Scenario 2
    Weaknesses in the platform’s security practices.

  1509. The names, email address and phone numbers of over three million hotel guests.
    Weaknesses in the platform’s security practices.

  1510. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platform’s security practices.

  1511. The names, email address and phone numbers of over three million hotel guests.
    Weaknesses in the platform’s security practices.

  1512. The card payment information of over three million guests.

    Weaknesses in the platform’s security practices.

  1513. 1. The names, email address and phone numbers of over three million hotel guests.
    2. Weaknesses in the platform’s security practices.

  1514. Scenario One: The hackers made away with the names, email addresses, and phone numbers of over three million hotel guests.

    Scenario Two: The hackers could access the students’ information as a result of the weakness in the platform’s security practices. It’s not an ideal thing to have such valuable personal information exposed on a publicly accessible cloud database without security measures.

  1515. Scenario1: The names, email address and phone numbers of over three million hotel guests.

    Scenario2: Weaknesses in the platform’s security practices.

  1516. 1. In the first scenario the hackers made away with the names, email address and phone numbers of over three million hotel guests.

    2. In the second scenario the hackers could access the students’ information as a result of the weakness in the platform’s security practices. It’s not an ideal thing to have such valuable personal information exposed on a publicly accessible cloud database without security measures.

  1517. In the first scenario, the cybercriminals used the username and password of one of the employees to get the information.
    while in the second scenario, I believe the hackers used the Weaknesses in the platform’s security practices. Because how will they explain leaving vital information of their students in a publicly accessible platform.

  1518. The names, email addresses, and phone numbers of over three million hotel guests.

    Weaknesses in the platform’s security practices.

  1519. Scenario 1
    The names, email address and phone numbers of over three million hotel guests.

    Scenario 2
    Weaknesses in the platform’s security practices

  1520. -The username and password of all of the hotel’s employees.
    -Weaknesses in the platform’s security practices.

  1521. The username and password of all of the hotel’s employees.

    Weaknesses in the platform’s security practices.

  1522. -The names, email address and phone numbers of over three million hotel guests.
    – Weaknesses in the platform’s security practices.

    1. Scenario 1
      The names, email address and phone numbers of over three million hotel guests.

      Scenario 2
      Weaknesses in the platform’s security practices

      1. scenario 1
        The names, email address and phone numbers of over three million hotel guests.

        scenario 2
        Weaknesses in the platform’s security practices.

        1. Scenario 1: The hotel chain’s reputation.

          Scenario 2: Weaknesses in the platform’s security practices.

              1. Day 2
                Answers to What Color is my hat?

                1. Gray hat: Uknown agenda and unauthorised access

                2. Black hat: Took advantage of customer account for financial gain

                3. Gray hat: Undisclosed agenda. May or may not report vulnerabilities of the system to the owner

                4. Black hat: Malicious agenda for financial gain

                5. White hat: Authorised access by the owner

                1. SCENARIO1:
                  The names, email address and phone numbers of over three million hotel guests
                  SCENARIO2:
                  Weaknesses in the platform’s security practices.

                  1. 1. The names, email address and phone numbers of over three million hotel guests.
                    2. Weaknesses in the platform’s security practices

      2. SCENERIO 1; The names, email address and phone numbers of over three million hotel guest

        SCENERIO 2;Weaknesses in the platform’s security practices.

        Reply

          1. Day 2 answers
            1. Gray hat hackers
            2. Black hat hackers
            3. White hat hackers
            4. Gray hat hackers
            5. White hat hackers

Leave a Reply to Emmans Mcdavid Cancel reply

Your email address will not be published. Required fields are marked *

Scroll to top