Scenario 1
Security breaches today are all too common, with attackers constantly finding new and innovative ways of infiltrating organizations in search of valuable information.
Scroll down to read the latest breaking security news headline.
What Happened?
According to our sources, a well known hotel chain that operates across the world has reported a massive data breach, with the personal information of over three million guests exposed to hackers.
The hotel discovered that hackers gained access to its customer database by using the login details of one of its employees.
At this point, the hotel doesn’t believe that the hackers were able to access any account passwords or financial information. Recent guests are encouraged to check the hotel chain’s web portal to see if they have been impacted by this breach.
*This is a fictional scenario.
This is a multiple choice question. Once you have selected an option, select the submit button below to submit your answer.
In this example, what did the hackers take?
Select the correct answer, then Submit.
- The card payment information of over three million guests.
- The names, email address and phone numbers of over three million hotel guests.
- The hotel chain’s reputation.
- The username and password of all of the hotel’s employees.
Scenario 2
eLearning Platforms at Risk!
The team at DEXA is concerned. eLearning platforms are becoming prime targets for attackers as more and more organizations make the move to digital learning.
SCROLL down to find out more about a recent case.*

A popular online training platform admitted leaving the personal data of millions of its students (many of them minors) exposed on a publicly accessible cloud database.

Hackers were able to directly access students’ full names, email addresses, phone numbers, and school enrollment details from the Internet!

While it’s unclear what the hackers have done with this acquired information, it’s safe to say that they have everything they need to carry out widespread phishing or malware attacks.
What Exploits?
What exploits did the hackers use in this case to gain access to valuable personal information?
Select the correct answer, then Submit.
- Weaknesses in the platform’s security practices.
- Extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer.
- Bypassing the platform’s access control methods.
- Taking advantage of student information not being correctly validated on the platform.
Scenario 2
Weaknesses in the platform’s security practices.
Extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer.
Taking advantage of student information not being correctly validated on the platform
Scenario 1
The card payment information of over three million guests.
The names, email address and phone numbers of over three million hotel guests.
The hotel chain’s reputation.
Team 2 : Day 2
1. White Hat Attacker
2. Black Hat Attacker
3. White Hat Attacker
4. Black Hat Attacker
5. White Hat Attacker
1. After hacking into ATM systems remotely using a laptop, this attacker worked with the ATM manufacturers to resolve the identified security vulnerabilities.
White hat
2. This attacker transferred $10 million into their bank account using customer account and PIN credentials gathered from recordings.
Black hat
3. This attacker’s job is to identify weaknesses in a company’s computer system.
White hat
4. This attacker used malware to compromise a company’s system and steal credit card information that was then sold to the highest bidder.
Black hat
5. While carrying out some research, this attacker stumbled across a security vulnerability on an organization’s network that they are authorized to access.
Gray Hat
The card payment information of over three million guests.
Bypassing the platform’s access control methods.
Scenario 2: Weaknesses in the platform’s security practices.
Scenario 1: The names, email address and phone numbers of over three million hotel guests.
Scenario 1: The names, email address and phone numbers of over three million hotel guests.
Scenario 2: Weaknesses in the platform’s security practices.
What Color Is My Hat?
1. White hat
2. Black hat
3. White hat
4. Black hat
5. Gray hat
Eunice ihemelandu
White
Black
Gray
Black
White
Eunice ihemelandu
Answer
Scenario1 The names, email address and phone numbers of over three million hotel guests.
Scenario 2:weakness in the platforms security practices