Group 3 ASM 01 02
Group 3 ASM 01 02
Group 3
Hà Quang Thống
Group Member
· From the large number of discovered · Also, user email addresses could be
records and the type of information made targeted by hackers who typically use
available, several negative outcomes could deceptive methods such as infusing leaked
occur including identity theft, fraud, and customer data into email communications
phishing scams. to trigger clickthrough to malicious
· Full names, residential address details, websites and installing malicious software.
ID documents, online login information · Moreover, website backend data could be
and location data could potentially be harnessed to exploit infrastructure
exploited by nefarious users to target including its app and website to generate
unsuspecting people that registered with ransomware attacks or simply to cripple its
the company. servers.
· Car registration and vehicle data could · Back-end technical logs expose not only
potentially be used to conduct insurance personal information but also, data that
fraud and other heinous crimes involving can be weaponized to obtain full control of
stolen identities. the server.
How can you prevent your personal information from being
exposed in a data leak and ensure that you are not a victim of Solutions
attacks – cyber or real-world – if it is leaked?
1) What is DMZ?
2) Why DMZ used for
network security?
3) Examples?
Static IP
Static IP?
Why is used in
security?
Examples?
NAT