Discussion Assignment Cyber Security Course- What was Taken?

Scenario 1

Security breaches today are all too common, with attackers constantly finding new and innovative ways of infiltrating organizations in search of valuable information.

Scroll down to read the latest breaking security news headline.

What Happened?

According to our sources, a well known hotel chain that operates across the world has reported a massive data breach, with the personal information of over three million guests exposed to hackers.

The hotel discovered that hackers gained access to its customer database by using the login details of one of its employees.

At this point, the hotel doesn’t believe that the hackers were able to access any account passwords or financial information. Recent guests are encouraged to check the hotel chain’s web portal to see if they have been impacted by this breach.

*This is a fictional scenario.

This is a multiple choice question. Once you have selected an option, select the submit button below to submit your answer.

In this example, what did the hackers take?

Select the correct answer, then Submit.

  1. The card payment information of over three million guests.
  2. The names, email address and phone numbers of over three million hotel guests.
  3. The hotel chain’s reputation.
  4. The username and password of all of the hotel’s employees.

Scenario 2

eLearning Platforms at Risk!

The team at DEXA is concerned. eLearning platforms are becoming prime targets for attackers as more and more organizations make the move to digital learning.

SCROLL down to find out more about a recent case.*

A popular online training platform admitted leaving the personal data of millions of its students (many of them minors) exposed on a publicly accessible cloud database.

Hackers were able to directly access students’ full names, email addresses, phone numbers, and school enrollment details from the Internet!

While it’s unclear what the hackers have done with this acquired information, it’s safe to say that they have everything they need to carry out widespread phishing or malware attacks.

What Exploits?

What exploits did the hackers use in this case to gain access to valuable personal information?

Select the correct answer, then Submit.

  • Weaknesses in the platform’s security practices.
  • Extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer.
  • Bypassing the platform’s access control methods.
  • Taking advantage of student information not being correctly validated on the platform.
Discussion Assignment Cyber Security Course- What was Taken?

2,754 thoughts on “Discussion Assignment Cyber Security Course- What was Taken?

    1. 2 The names, e-mail addresses and phone numbers of over three million hotel guests
      Weaknesses in the platforms security practices

  1. DAY 1
    Scenario 1
    Ans: The names, email address and phone numbers of over three million hotel guests.

Leave a Reply to Gidoty Cancel reply

Your email address will not be published. Required fields are marked *

Scroll to top