Assignment 2 Questions Cybersecurity
Assignment 2 Questions Cybersecurity
1
Project 3.1: Finding Out About Cyber Stalking and the Law
1. Using the Web or other resources, find out what your state’s, country’s, or province’s
laws are regarding cyber stalking.
2. Write a brief paper describing those laws and what they mean. You may select to do a
quick summary of several laws or a more in-depth examination of one law. If you choose the
former, then simply list the laws and write a brief paragraph explaining what they cover. If
you choose the latter option, then discuss the law’s authors, why it was written, and
possible ramifications of the law.
2.2
Research major types of cyber attacks. Write a 5 page paper that includes the
following:
1. A summary of 3 types of attacks.
2. A real-life example for each type of attack.
3. Information on how to prevent the attacks.
4. Evaluation of which of the attacks is the hardest to pro- actively protect against
and why.
2.3
Share an article on a cyber attack. Provide a critique on how the organization
responded to the attack.
Project 3.1:
stalking, or other offences. Bullying has always been a problem for teenagers, but
cyberbullying—bullying that takes place over the internet—is a newer version of this age-old
social evil that poses new issues for youth and those around them. With text messaging and
other networking sites becoming a vital element of teen social interaction, this behaviour is
becoming more widespread. Many people are unaware that cyberbullying is a crime. Several
Wisconsin criminal statutes, particularly harassment and stalking, may apply to cyberbullying
the victim is subjected to two or more acts that annoy or intimidate her. When aggravating
conditions exist, such as the bully purposefully acquiring access to the victim's personal
details through digital communication or threatening the victim in a way that puts them in
the victim with death or grave bodily damage. A class a misdemeanours carries a maximum
Felonies. The crime becomes a class I felony if the offender has a prior conviction for
harassment involving the same victim and the current infraction occurs within seven years of
Free Speech
The United States Constitution protects free speech as a basic, but restricted, freedom.
When communication (words and acts) is likely to be damaging to others right away, the
government has the authority to penalise it. Falsely exclaiming "fire!" in a packed theatre and
sending terrorist threats are two examples. Because the distinction between protected and
Not all crimes necessitate a legitimate fear on the part of the victim, but some do.
Criminal stalking, for example, demands that the bully's actions cause the victim to
experience fear or substantial mental distress that is justified under the circumstances. As a
result, if the victim was hypersensitive to behaviour that would not have upset a reasonable
The juvenile court system primarily deals with children between the ages of ten and
sixteen. Instead of perjury prosecution and conviction, a juvenile will face a delinquency
charge and an adjudication. Juvenile court judges have more discretion in sentencing than
purposes, which means they can be convicted and sentenced to prison just like adults. In
some cases, one party may request that a 17- to 19-year-old be sent to juvenile court. The
References:
https://wilawlibrary.gov/topics/justice/crimlaw/stalking.php
Project 4.2:
Three VoIP providers in the United Kingdom have been targeted by DoS
(DDoS) attacks.
At least three UK VoIP services have been targeted by a DDoS attack, according to
the Cloud Communications Alliance (CCA). In an email sent on that morning, CCA stated
that it has learned of a "sophisticated, specific, and ongoing attack" perpetrated by the
Russian cybercriminal outfit REvil. Two of the three providers were identified as victims of
the hack on Monday, but CCA did not name the third. According to the business, the attack
on Voip Unlimited core network began on August 31 and lasted 75 hours. No more attacks
happened over the weekend, according to a report provided this morning by this business.
The attack was detected at the same time by London-based Voipfone, which claimed this
morning that its services are fully operating and traffic is being actively monitored. During
the three-day timeframe, both companies' services were disrupted. According to CCA, the
The assault entails repeatedly bombarding a company's network with traffic ranging from 100
to 450 gigabits per second. It begins with an attack on IP addresses used for SIP entrance and
egress, but quickly expands to include additional services. The attack, according to CCA, can
References
[1] https://www.computerworld.com/article/2564424/how-to-defend-against-ddos-
attacks.html
2.2 Cyber Attacks
Introduction
attack vectors, including malware, phishing, ransom ware, and man-in-the-middle attacks.
Inherent and residual dangers allow each of these attacks to take place. By hacking into a
vulnerable system, a cybercriminal can steal, alter, or destroy a specific target. A data breach
with one or more exploitable flaws. The resource's confidentiality, integrity, or availability
could be jeopardised as a result of the war. Disruption, data expose, or centralisation may
spread beyond the one first identified as exposed in some computer security, including
sensitive information such as credit card company account details. While an attacker can
access an IT system in a variety of ways, the majority of cyber-attacks use approaches that
are quite similar. The sorts of cyber-attacks listed below are some of the most common-
Types of Attacks
Malware attacks are popular cyber-attacks in which malware performs illegal actions
on the victim's computer. Malicious software covers a wide range of assaults, including
ransom ware, spyware, command and control, and more. Malware has been accused by
criminal organisations, state actors, and even well-known enterprises. Because of their
widespread impact, some malware attacks, like other types of cyber-attacks, receive
widespread media attention. The WannaCry ransom ware assault is an example of a well-
Phishing is a sort of cyber security assault in which hostile actors send messages
posing as a trusted individual or organisation. Phishing communications trick users into doing
things like downloading a harmful file, opening a malicious link, or disclosing personal
information like login credentials. The most popular sort of social engineering is phishing,
which is a broad word for attempts to mislead or deceive computer users. In practically all
security events, social engineering is becoming a more common threat vector. Phishing and
other social engineering assaults are frequently integrated with additional threats including
A Queries is a demand submitted to a database, a digital store of data for some type of
activity or function to be performed, such as data querying or SQL code execution. Whenever
a user's login information is submitted using a web form to get access to a website, this is one
example. This kind of web form is typically meant to accept only a few types of data, such as
a name and/or password. When that data is entered, it is compared to a database, and if the
two match, the user is permitted access. They will be refused access if they do not comply.
There are potential difficulties because most web forms do not have a way to prohibit more
data from becoming entered. Attackers can take advantage of this weakness by using input
boxes on the form to submit their own searches to the databases. This could allow them to
participate in a range of illegal activities, such as data theft or data manipulation for personal
advantage.
In May 2017, the Ransomware outbreak became a global pandemic. This ransomware
assault infected Microsoft Windows-based computers. Users' files were kidnapped, and a
Bitcoin ransom was required to get them back. The harm caused by this attack may have been
prevented if not for the ongoing usage of antiquated systems and an illiteracy about the
importance of installing software. The cybercriminals behind the attack used a hack
Windows version. This breach, codenamed EternalBlue, was made public by a group of
hackers known as the Threat Actors prior to the WannaCry assault. Let's look at how the
WannaCry ransomware outbreak happened and what it meant. Here are a few pointers from
us. Computer users became targets of the WannaCry attack because they had not updated
their Microsoft Windows operating system. If they had maintained their network services on
a regular basis, they would have profited from the latest update given by Microsoft prior to
the intrusion. This vulnerability was used by EternalBlue to infect machines with the
WannaCry ransomware, which was addressed by this patch. Make absolutely sure your
computer system and software are updated. This is an important step towards avoiding
ransomware. Computer users became targets of the WannaCry attack because they had not
updated their Microsoft Windows operating system. If they had maintained their network
services on a regular basis, they would have profited from the latest update given by
Microsoft prior to the intrusion. This vulnerability was used by EternalBlue to infect
machines with the WannaCry ransomware, which was addressed by this patch. Make
absolutely sure our computer system and software are updated. This is an important step
towards avoiding ransomware. Make regular backups of our data using an external hard drive
or online storage. If we have backed up our files, it will be protected if we are hit by
ransomware criminals. After we have stored up our data, remember to disconnect our
external storage device from our computer. If we attach our external harddrive to our PC on a
regular basis, we risk exposing it to ransomware families that can encrypt data on these
2020, aiming to obtain consumer credit card information. The email claimed that the
customer's account had been deleted owing to too many failed login attempts and directed the
user to a bogus Amazon Billing Centre website, where they were urged to re-enter their
payment details.
Malware and other malicious payloads in email communications can be protected with
modern email filtering technologies. Emails with harmful links, attachments, spam content,
and language that could indicate a phishing attack can be detected using solutions. Email
security solutions block and quarantine questionable emails automatically, and data
encryption technology "detonates" emails to see if they contain harmful code. Simulated
phishing attempt testing can assist security teams in evaluating the effectiveness of security
awareness training programmes as well as helping end users better comprehend assaults.
Even if our employees are skilled at spotting fraudulent messages, they should be put through
phishing tests on a regular basis. Because the threat landscape is constantly changing, cyber-
APT gang hackers launch GhostShell attack Using SQL injection, Team GhostShell
attacked 53 universities, stealing and publishing 36,000 student, academic, and staff personal
details. Whether we're a website owner, a normal internet user, or a huge organisation, SQL
injection attacks can affect us. SQL injection will continue to be a prevalent attack vector in
the future due to its widespread use. As we can see, we have a lot of options for avoiding an
attack. The easiest way to avoid SQL injection is to take proper safety precautions. This
enables companies to safeguard their data and respond to attacks before they cause
substantial harm. SQL injection attacks can be avoided by cleaning up application code and
utilising parameterized queries to differentiate between legitimate and malicious input. [2]
Between the internet and a web application, a software firewall serves as a barrier, filtering
out malware and questionable activity. We can configure our WAF to give adequate
protection against Code injection as well as other types of cyber-attacks like cross-site
scripting (XSS) and cookie poisoning, among others. If a SQL injection vulnerability is found
in open source code, a WAF can help guard against future risks while patches are being
developed. SQL injection can be considerably reduced by limiting our application's database
privileges. Use the least privilege principle, which asserts that database users should only
Rather of having a single database user for your application, we may want to explore creating
multiple database users and assigning them to various application roles. We should keep an
eye on every link in the security chain to avoid significant consequences. [3]
Conclusion
To win the battle against cybercrime, businesses must first understand how they are
being attacked. Here are the six least dangerous types of cyber-attacks, as well as how to
avoid them. The objectives behind cyber-attacks have varied in recent years, with
disinformation and disruption joining the more classic drives of data theft, extortion, and
damage, and the issues they bring have several private security companies on the back foot.
So more individuals and devices that a network connects, the further difficult it is for hackers
to escalate the cost of an attack to the point where they will give up. The value of a network
is proportional to the square of the number of users connected to it, according to Metcalfe's
Law. As a result, security teams must accept that their networks will be constantly assaulted;
but, by understanding how various types of cyber-attacks work, preventative controls and
strategies can be introduced to reduce the damage they can cause. The following are the most
necessitates identifying and exploiting one or more vulnerabilities or gaps in their victim's IT
infrastructure. According to data from the United Kingdom's Data Protection Authority,
phishing was the biggest target of hackers in 2019, accounting for nearly 90% of all
manager, errors could be either inadvertent actions or lack of action. As a result, security
awareness training is a primary priority in the fight against cyber-attacks, and because attack
strategies are always improving, training must be updated to ensure users are aware of the
most recent types of attack. A cyber assault scenario program can be used to test employee
cyber knowledge and provide further training in areas where there are clear gaps.
References
[1] https://www.kaspersky.co.in/resource-center/threats/ransomware-
wannacry
[2] https://www.checkpoint.com/cyber-hub/threat-prevention/what-is-
phishing/
[3] https://www.siemxpert.com/blog/sql-injection-real-life-attacks-examples-
sqli-prevention-mitigation/
2.3
Many parties are impacted in the event of a massive, complicated cyber-attack. It is vital that
they participate in response efforts. However, a successful and timely response necessitates
more than their participation; tight, round-the-clock teamwork is essential. Only when all of
the stakeholders collaborate can a rapid, accurate, and cost-effective response be achieved. In
the event of a large cyber-attack, it is highly typical for a company to hire a third-party firm
to assist with response actions. To be able to interact successfully with all participants, the
party must have extensive legal, regulatory, and investigations skills. As the occasion unfolds
over days, working days, or maybe even months, they assist in conducting timely and
process among all stakeholders, and centrally managing all questions received from domestic
A centralised cyber response plan is essential for bringing together parties with
varying interests who must work together to resolve the cyber-attack. Investigating their
functions.
The complete board is responsible for risk oversight. The board is in charge of the response
strategy, which involves contacting employees, the general public, shareholders, and, most
likely, regulators and law enforcement. In addition, the board (or audit committee) must
CFO: The CFO has the responsibility to verify the integrity of the company’s financial
controls and data, understand the potential adverse financial impact of the incident and
determine the appropriate financial disclosures in relevant filings, all of which have a direct
impact on the board’s communication with shareholders and the broader public.
The in-house lawyer assists the forensic investigators with practical issues such as
evidence gathering, root-cause analysis, and electronic discovery. In-house counsel typically
takes the lead when dealing with regulators and outside lawyers. They must quickly assess
the incident's possible compliance and legal ramifications in order to properly engage with a
Internal and external communication teams are critical for ensuring that the incident is
adequately conveyed to workers, clients, shareholders, and other third - party who may be
affected. Employees who have been adequately informed can aid in the investigation and take
the required steps to prevent the breach from spreading further. To restore trust and inspire
confidence in the organization's ability to manage cyber risk and reduce the incident's
In the event of a cyber-attack, the chief compliance officer (CCO) is responsible for
assessing the regulatory compliance risk, whether it is connected to data protection and
countries or jurisdictions, posing issues for the CCO in resolving the difference — and
sometimes even conflict — between them. When dealing with these challenges, the CCO
must engage closely with privacy experts, the legal department, the board, and the executive
team.
Many major companies hire a chief security officer (CSO), whose main task is to
protect all assets – whether physical, IT, intellectual property, or people – from all dangers,
sponsored groups. As part of the organization's "licence to operate," the CSO is generally
industries, government and defence procurement, and key national infrastructure services.
The chief information security officer (CISO) collaborates closely with the
investigation team to quickly identify the root cause of the attack, comprehend its scope, and
assess the threat's risk impact — data stolen, systems impacted, and level of penetration — in
order to contain and eliminate the threat and perform remediation activities. The CISO should
also carefully review the investigation's findings and acquire useful information so that the
Reference
[1] https://www.sciencedirect.com/science/article/pii/S2352484721007289
[2] https://hbr.org/2021/03/cyberattacks-are-inevitable-is-your-company-prepared