0% found this document useful (0 votes)
151 views3 pages

1134 Lab Visualizing The Black Hats

This lab activity involves students researching and creating hypothetical cyber attack scenarios. Students will describe 3 scenarios, each with an attacker, their organization or group affiliation, attack motive, method used, target and vulnerability exploited, and how the attack could have been prevented or mitigated. The background provides statistics on annual cybercrime losses and increasing frequency of cyber attacks targeting governments, businesses, and individuals. Students are advised to do their research in a virtual machine to avoid malware risks.

Uploaded by

setyabudhi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
151 views3 pages

1134 Lab Visualizing The Black Hats

This lab activity involves students researching and creating hypothetical cyber attack scenarios. Students will describe 3 scenarios, each with an attacker, their organization or group affiliation, attack motive, method used, target and vulnerability exploited, and how the attack could have been prevented or mitigated. The background provides statistics on annual cybercrime losses and increasing frequency of cyber attacks targeting governments, businesses, and individuals. Students are advised to do their research in a virtual machine to avoid malware risks.

Uploaded by

setyabudhi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

1.1.3.

4 Lab – Visualizing the Black Hats


itexamanswers.net/1-1-3-4-lab-visualizing-the-black-hats.html

Rate this post

Objectives
Research and analyze cyber security incidents

Background / Scenario
In 2016, it was estimated that businesses lost $400 million dollars annually to cyber
criminals. Governments, businesses, and individual users are increasingly the targets of
cyberattacks and cybersecurity incidents are becoming more common.

In this lab, you will create three hypothetical cyber attackers, each with an organization,
an attack, and a method for an organization to prevent or mitigate the attack.

Note: You can use the web browser in virtual machine installed in a previous lab to
research security issues. By using the virtual machine, you may prevent malware from
being installed on your computer.

Required Resources
PC or mobile device with Internet access

Scenario 1:
a. Who is the attacker?
_____________________________________________________________________

1/3
b. What organization/group is the attacker associated with?
_____________________________________________________________________

c. What is the motive of the attacker?


_____________________________________________________________________

d. What method of attack was used?


_____________________________________________________________________

e. What was the target and vulnerability used against the business?
_____________________________________________________________________

f. How could this attack be prevented or mitigated?


______________________________________________________________________

Scenario 2:
a. Who is the attacker?
______________________________________________________________________

b. What organization/group is the attacker associated with?


______________________________________________________________________

c. What is the motive of the attacker?


______________________________________________________________________

d. What method of attack was used?


______________________________________________________________________

e. What was the target and vulnerability used against the business?
______________________________________________________________________

f. How could this attack be prevented or mitigated?


______________________________________________________________________

Scenario 3:
a. Who is the attacker?
______________________________________________________________________

b. What organization/group is the attacker associated with?


______________________________________________________________________

c. What is the motive of the attacker?


______________________________________________________________________

d. What method of attack was used?


______________________________________________________________________

2/3
e. What was the target and vulnerability used against the business?
______________________________________________________________________

f. How could this attack be prevented or mitigated?


______________________________________________________________________

3/3

You might also like