Discussion Assignment Cyber Security Course- What was Taken?

Scenario 1

Security breaches today are all too common, with attackers constantly finding new and innovative ways of infiltrating organizations in search of valuable information.

Scroll down to read the latest breaking security news headline.

What Happened?

According to our sources, a well known hotel chain that operates across the world has reported a massive data breach, with the personal information of over three million guests exposed to hackers.

The hotel discovered that hackers gained access to its customer database by using the login details of one of its employees.

At this point, the hotel doesn’t believe that the hackers were able to access any account passwords or financial information. Recent guests are encouraged to check the hotel chain’s web portal to see if they have been impacted by this breach.

*This is a fictional scenario.

This is a multiple choice question. Once you have selected an option, select the submit button below to submit your answer.

In this example, what did the hackers take?

Select the correct answer, then Submit.

  1. The card payment information of over three million guests.
  2. The names, email address and phone numbers of over three million hotel guests.
  3. The hotel chain’s reputation.
  4. The username and password of all of the hotel’s employees.

Scenario 2

eLearning Platforms at Risk!

The team at DEXA is concerned. eLearning platforms are becoming prime targets for attackers as more and more organizations make the move to digital learning.

SCROLL down to find out more about a recent case.*

A popular online training platform admitted leaving the personal data of millions of its students (many of them minors) exposed on a publicly accessible cloud database.

Hackers were able to directly access students’ full names, email addresses, phone numbers, and school enrollment details from the Internet!

While it’s unclear what the hackers have done with this acquired information, it’s safe to say that they have everything they need to carry out widespread phishing or malware attacks.

What Exploits?

What exploits did the hackers use in this case to gain access to valuable personal information?

Select the correct answer, then Submit.

  • Weaknesses in the platform’s security practices.
  • Extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer.
  • Bypassing the platform’s access control methods.
  • Taking advantage of student information not being correctly validated on the platform.
Discussion Assignment Cyber Security Course- What was Taken?

2,754 thoughts on “Discussion Assignment Cyber Security Course- What was Taken?

  1. 1. White hat attacker
    2. Weakness in the platforms security
    3. Extracting information when the volume of student data exceeds the storage capacity of the platform’s memory buffer.

  2. Thank you for your sharing. I am worried that I lack creative ideas. It is your article that makes me full of hope. Thank you. But, I have a question, can you help me?

  3. SCENERIO 1
    The names, email address and phone numbers of over three million hotel guests.
    SCENERIO 2
    weakness in the platform’s security practices

  4. SCENERIO 1: The names, email address and phone numbers of over three million hotel guest

    SCENERIO 2: Weaknesses in the platform’s security practices.

  5. 1. The names, email addresses, and phone numbers of over three million hotel guests.
    2. Weaknesses in the platform’s security practices.

  6. 1. Gray hat attacker
    2. black hat attacker
    3. white hat attacker
    4. black hat attacker
    5. white hat attacker

Leave a Reply to Ibefrancis3 Cancel reply

Your email address will not be published. Required fields are marked *

Scroll to top