Lab 1 - Cybersecurity at A Glance
Lab 1 - Cybersecurity at A Glance
Lab 1 - Cybersecurity at A Glance
Student ID 21521717
Full name Phạm Trọng Khanh
Total completion time
Self-assessment grade
Feedback (if any)
A. Threat Identification
Objectives
Explore the security features used by organizations to keep data safe.
Part 1: Exploring the Threat of Cyberattacks
Part 2: CIA Triad
Background / Scenario
The threats posed by the cyber world are real. These threats have the potential to wreak havoc on life in a
computer centric world. Understanding these threats is important to everyone and in order to combat them,
the world needs committed individuals that can recognize threats, and outmaneuver and outsmart cyber
criminals. In order to develop the talent needed, organizations like CompTIA, Cisco Systems and ISC2 have
created programs to educate and certify cyber professionals.
Required Resources
PC or mobile device with Internet access
© 2022 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 9
Lab 1 – Cybersecurity at a glance
In my opinion, “ransomware is rife” is the most dangerous. Because, while many other types of malware and
crypto-ware programs have existed in the past, ransomware has several distinguishing characteristics that set it
apart from the others.
• Ransomware employs unbreakable encryption, making decryption of infected files extremely difficult.
• It can encrypt almost any sort of file, including audio, video, documents, and photographs.
• Ransomware can obfuscate file names, making it difficult, if not impossible, to figure out what files were
impacted.
• This harmful malware might alter the extensions of your filenames, causing them to behave erratically or
not at all.
• Most ransomware-related ransoms include a time constraint. Extending the deadline usually means the
ransom will be increased, or the data will be deleted entirely.
____________________________________________________________________
____________________________________________________________________________________
b. List five ways a cyber-criminal can use computers to break the law. Can any of the crimes you listed
affect you personally? Have you or your family members been affected by these crimes?
1. The invasion of privacy is basically the act of someone attempting to intrude on a person's personal
life. This includes hacking into a person's computer, reading their emails or monitoring online activities.
Many of these specific crimes are punishable under the law
2. A cybercriminal or hacker lures unsuspecting PC users into revealing sensitive or other personal data
- login credentials, credit card numbers, PINs, etc. This process is usually accomplished through phishing
websites which are designed to mimic a legitimate website in hopes that the unsuspecting computer user
will enter several bits of personal information such as their banking passwords, home address or even
social security number
3. Cybercrooks who may have gained access to your credit card or banking account information may use
that information to make purchases in your name. Identity theft has been a major issue even before the
conception of the Internet but as you may already know, the virtual world has made it much easier for
criminals to utilize and steal your identity
4. Harassment online is usually related to your social lifestyle and if you choose to use a popular social
network such as Facebook or Twitter. Online harassment can consist of threats sent through email,
instant message or through a social network message/post
© 2022 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 2 of 9
Lab 1 – Cybersecurity at a glance
5. Cyberstalkers will go to great lengths to try to monitor a victims online activity. This may include
infecting a person's computer with malware that is able to log computer activity. Cyberstalkers are also
known to continually harass their potential victims
I don’t think cyber-criminal can affect me personally because I already know the way they attack and
have the solution to prevent. For example the crime number 2, you can use a phishing filter feature on
your web browser so that it can actively scan websites that you visit to check if they have been identified
as a phishing website.
Yes, my family members have been attacked by these crimes. My father’s email was received an igconito
mail with a link. He didn’t know that was a threat and he clicked on link in the mail. After that, he lost his
email account
____________________________________________________________________________________
____________________________________________________________________________________
c. Have any of the potential threats portrayed in the video actually happened in Vietnam recently? Give an
example.
Ransomware increases 200 percent in Viet Nam from the beginning. For example in covid-19 cyber-
attackers carry out many attacks, phishing website appear more (fake health ministry’s website, fake
charity website) strengthen network tools, spread, infect malicious code, scam charity, destroy information
of users, as well as organizations.
Here is top 10 country most affected by ransomware. Viet Nam is top 3
____________________________________________________________________________________
____________________________________________________________________________________
© 2022 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 3 of 9
Lab 1 – Cybersecurity at a glance
b. Describe the SolarWinds attack of 2020. Who was responsible and what did the cyber criminals steal?
Describe the SolarWinds: The SolarWinds hack was a masterfully orchestrated supply chain exploit that
compromised multiple systems of governments and companies worldwide. This attack was first
discovered by the cybersecurity firm FireEye in December 2020. Analysts at FireEye found unusual data
being sent to a server of unknown origin. However, FireEye has concluded that affected systems may
have been infected as far back as early 2020. Upon further investigation, it was uncovered that one of the
servers that provides access to updates and patches for SolarWinds Orion tools was compromised, thus
allowing the attackers to inject code into the software updates and infect multiple clients at once. This
code allowed data modification and exfiltration as well as remote access to devices that had the software
installed. This malware has since been dubbed “SUNBURST.” Due to the complexity and overall scope of
this attack, it has since been attributed to an Advanced Persistent Threat (APT) actor.
FireEye was responsible and the cyber criminals steal data from governments and companies worldwide
____________________________________________________________________________________
____________________________________________________________________________________
c. What is the 3 most common method of attacks in 2021? Describe and give an example for each method.
The 3 most common method of attacks in 2021:
- Malware: There are many different types of malwares, which are programs or codes created to harm
any device or server in an IT infrastructure or the entire IT infrastructure. Malware attacks that make it
easier to enter the IT infrastructures of institutions through the backdoor can come in the form of
ransomware, computer worm, trojan, spyware, and adware.
It is stated that malware, which can cause the security of sensitive data stacks to be compromised and
disrupt the workflows of institutions, has increased by 800% since the beginning of 2020. On the other
hand, it is worth mentioning that even large companies in the IT sector can be adversely affected by
malware attacks. For example, Microsoft was hit by the WannaCry attack in 2017, which infected over
230,000 machines running Windows operating systems in over 150 countries in a single day.
- Ransomware: Ransomware is a type of malicious software that blocks users in your IT infrastructure
from accessing the system and captures their sensitive data. It is a type of cyber-attack that is quite good
at turning your entire system inoperable in a short period of time. Ransomware attacks, which can also
target servers in the database, encrypt the data they capture, and demand a ransom in exchange for
restoring access. Ransomware attacks, which can cause significant financial losses for companies, can
also damage the corporate image.
- Phishing attacks: Phishing is a type of social engineering attack that tricks victims into sharing critical
data such as passwords and credit card information. In these types of attacks, victims can also be
convinced to download a file by clicking on a link in an e-mail. In all circumstances, privileged accounts in
your institution's IT infrastructure are in serious danger of data breaches. In addition to e-mail, phishing
attacks can also be carried out via SMS, phone, and social media platforms.
© 2022 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 4 of 9
Lab 1 – Cybersecurity at a glance
Confidentiality is about protecting private information, personal details and avoiding date leaks.
Confidentiality builds trust between employer and employee and business owners have an obligation to
keep staff information secure and trusted. When using computer systems, individuals and business are
often required to share very sensitive data. The organizations that collect this data are responsible for its
safety and privacy. In the wrong hands, sensitive information can be misused to commit illegal activity.
____________________________________________________________________________________
____________________________________________________________________________________
b. What is data integrity? Name three ways data integrity or trustworthiness is affected.
Integrity is accuracy, error-free data and learning how to notice violations
3 ways: Equipment failure, errors, mistakes by people
____________________________________________________________________________
____________________________________________________________________________________
c. What is system availability? What can happen if a critical computer system is no longer available?
System availability is you have the information, systems and resources you need to do your job and
service your customers
When the critical system of a computer is not accessible it may result in loss of data
____________________________________________________________________________________
____________________________________________________________________________________
Background / Scenario
This chapter introduces the student to the cyber world. This cyber world is full of data kingdoms that handle
unimaginable amounts of personal and organizational information. As cybersecurity professionals, it is
important to understand the types of cybersecurity safeguards an organization must implement in order to
protect the data they store, manage, and protect. In this lab, you will explore one of the world’s largest data
© 2022 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 5 of 9
Lab 1 – Cybersecurity at a glance
handling organizations, Google. You will watch two videos and then answer a series of questions. Each video
presents a different aspect of cybersecurity defense at Google. Upon completion, you will have a better
understanding of the security measures and services that organizations like Google take in order to protect
information and information systems.
Videos:
How Google Protects Your Data
Security Key
Required Resources
PC or mobile device with Internet access
© 2022 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 6 of 9
Lab 1 – Cybersecurity at a glance
As the data you create moves between your device, Google services and our data centres, it is protected
by security technology such as HTTPS and Transport Layer Security. We also encrypt email at rest and in
transit by default and encrypt identity cookies by default.
____________________________________________________________________________________
____________________________________________________________________________________
© 2022 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 7 of 9
Lab 1 – Cybersecurity at a glance
Yes. If you are asked for a Security Key and do not have it available, you will always have the option to
use a verification code. Simply click the link at the bottom of the screen that says use verification code
instead.
____________________________________________________________________________________
C. Firewall setting
Part 1. Setting window firewall
1. block program;
- block one apps
- test
- unblock
- delete the rule
2. block ports;
© 2022 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 8 of 9
Lab 1 – Cybersecurity at a glance
5. dns attack
edit host file
© 2022 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 9 of 9