Nikhil Aryal: Roshan Sapkota Aarya Dahal Kushal Poudel
Nikhil Aryal: Roshan Sapkota Aarya Dahal Kushal Poudel
Nikhil Aryal: Roshan Sapkota Aarya Dahal Kushal Poudel
(Narapichas)
Roshan Sapkota
Aarya Dahal
Kushal Poudel
Hacking
Hacking is referred to exploiting the system vulnerabilities and
compromising security in order to gain unauthorized or inappropriate
access to system resources misusing electronic devices.
Hackers.
A hacker is an intelligent individual, who breaks into system
without authorization to destroy, steal sensitive data, or perform
malicious activities, with exceptional computer skills with enough
knowledge to discover vulnerability.
TYPES OF HACKERS.
Black Hat Hackers
01 They are the hackers who go out their way to find vulnerabilities
and exploit them for financial gain, malicious purpose, to gain
reputation.
White Hat Hackers
02
They are hired by an organization to test holes in the security
system and attempt to prevent the success of the black hat
hacker through proactive hacking.
Grey Hat Hackers
They attempt to violate standards and principles but without
03 intending to do harm or financial gain and are typically carried out
for the common good.
Vianet’s Data breech: Narapichas
Vulnerabilities analysis
In case of Vianet, IDOR (Insecure direct object reference, a type of access control
vulnerability in digital security) was exploited by Narapichas. This can occur when a
web application or application programming interface, uses an identifier for direct
access, to an object in an internal database but does not check for access control or
authentication. So, it also falls under the category of external assessment.
Risk analysis
In the risk assessment matrix, Vianet’s Data Breach falls under the scenario where it
is possible to happen in future as well with the severity rating of moderate. Similar
database breaches has have occurred in Nepal with catastrophic severity rating.
Similar Cases Of Database Breaches
Department Mercantile
Regime’s various
Foodmandu of Communications
Departments
Passports Pvt Ltd.
On July 25, 2017, 58 On June 27, 2017, On April 15, a group of
On March 2020, The regime websites were Department of hackers gained
hackers have leaked the reportedly hacked by Passports got unauthorized access to
database consist of more a hacking group hacked by a group data systems of the dot
than 50,000 Utilizer called ‘Paradox of Turkish hackers np (.np) domain
denominations, personal Cyber Ghost’, and defaced with of Mercantile
detail, latitude, longitude, making it one of the threatening notes to Communication Pvt.
current address, emails, largest breaches of all reveal the Ltd in Nepal and
and phone number., times in Nepal. government’s data. launched a cyber-attack
As a Security Analyst or Security Engineer what would I do?
Before Attack:
• Scan the system often to check for possible vulnerabilities.
• When the hacker warned about vulnerabilities, take it seriously and find a way to
patch it up.
• Encrypt the data in the best way possible.