Group Discussion
Group Discussion
a) Network Devices:
Firewalls stand between your company's private network and the public internet. It monitors
both incoming and outgoing network traffic and independently allows or blocks traffic based
on a predetermined set of rules. Some of the rules could be to deny access to unwanted
incoming traffic from specific IP addresses, allowing access only to trusted sources. Most
firewalls will come out-of-the-box with a listing of untrusted IP addresses to protect against
well-known threats. A network administrator can also whitelist and blacklist certain domains
in order to configure network security rules to the company's needs. Configuring firewalls
beyond their respective defaults is always a configuration best practice in order to further
b) Transmission Media
Wired Media: It includes copper cables-like Ethernet and fibre optic cables that provide very
high-speed and reliable connections. Wireless Media: It employs radio waves, such as Wi-Fi
On May 15, 2024, Ticketmaster confirmed the breach of their security affecting over
40 million users. Researchers of incident response said the threat actors breached the company's
internal network by exploiting a vulnerability in the customer service portal; after gaining
unauthorized access the attackers have exfiltrated huge volumes of customer data, full names,
email addresses, payment details, and history regarding purchased tickets. This included the
swift action that was taken by Ticketmaster in closing down affected systems, informing
customers, and working with cybersecurity experts in an attempt to investigate the breach.
Despite all these efforts, the damage had already been done, and the data stolen soon started
popping up for sale in dark web forums shortly after the attack.
Consequences: The ticket master data breach in May 2024 saw very serious ramifications for
the company and its customers: Customer Impact: Sensitive data, including names, e-mail
addresses, physical addresses, and partial credit card information of more than 500 million
users, were stolen. This exposed those users to a number of identify-theft and financial-fraud
risks. Reputation Damage: Community reputation at Ticketmaster was badly marred. A breach
of this nature, on such a huge scale, would surely have shaken the confidence of the customers
in the platform and might therefore decrease user interaction and sales. Legal and Financial
Consequences: The breach exposed the company to possible class-action lawsuits and
regulatory scrutiny. Laws on data protection, such as the GDPR in Europe, may even lead to
heavy fines for this type of incident. Wider Implications: This is one of the largest breaches
that happened in recent times, pointing toward vulnerabilities in the practice of customer data
similar attacks.
Prevention: The Ticketmaster breach is a stark reminder of the persistent threat posed by
cybercriminal groups like Shiny Hunters. Indeed, organizations should stay on their toes; they
will need to be up to date in security matters and teach employees about the latest cyber threats.
stored on mobile devices remains safe through encryption, remote wiping, and secure access
protocols. Threat Mitigation: It prevents unauthorized access malware, which are usually used
with data protection regulations like GDPR, HIPAA, and CCPA through the regulation of
4. Discuss the importance of cybersecurity awareness training. What topics should be covered
in such training?
Risk Reduction: Users will learn to identify phishing emails, suspicious links, and other attack
compliance, such as GDPR, HIPAA, or CCPA, without legal risks being at large.
Incident Response: Educated staff can take quick action on incidents themselves and may
minimize further damages or downtime. Cultural Shift: Establishes a security conscious work