SlideShare ist ein Scribd-Unternehmen logo
1 von 1
Downloaden Sie, um offline zu lesen
Assignment 2 20% 1. A company called XYZ Inc. has recently migrated its entire infrastructure to
the cloud. However, they did not put enough emphasis on network security and have become a
target for a cyber attack. The attackers were able to penetrate the company's network and access
sensitive information, including customer data and financial information. a) How did the attackers
gain access to the network? 5M b) Draw an attack tree threat modelling. 10M c) What was the
impact of the attack on XYZ Inc.? 5M d) How can XYZ Inc. prevent similar attacks in the future?5M
(25 Marks) 2. Scenario: A company's network is attacked by a hacker who gains access to
sensitive information. a) How did the hacker gain access to the network? 5M b) What type of
information was compromised in the attack? 5M c) How long did the hacker have access to the
network? 5M d) What impact did the attack have on the company? 5M e) What measures can the
company take to prevent future attacks? 5M (25 Marks) 3. a) Draw a web application security
architecture. 12M b) How to countermeasure web security attacks? 8M (20 Marks)

Weitere ähnliche Inhalte

Ähnlich wie Assignment 2 20 1 A company called XYZ Inc has recently m.pdf

Data security in cloud
Data security in cloudData security in cloud
Data security in cloud
Interop
 
CyberSecurity - UH IEEE Presentation 2015-04
CyberSecurity - UH IEEE Presentation 2015-04CyberSecurity - UH IEEE Presentation 2015-04
CyberSecurity - UH IEEE Presentation 2015-04
Kyle Lai
 

Ähnlich wie Assignment 2 20 1 A company called XYZ Inc has recently m.pdf (20)

How Artificial Intelligence (AI) use in Cybersecurity
How Artificial Intelligence (AI) use in CybersecurityHow Artificial Intelligence (AI) use in Cybersecurity
How Artificial Intelligence (AI) use in Cybersecurity
 
Top 5 Famous Cyberattacks Of The World | SOCVault
Top 5 Famous Cyberattacks Of The World | SOCVaultTop 5 Famous Cyberattacks Of The World | SOCVault
Top 5 Famous Cyberattacks Of The World | SOCVault
 
MITRE ATT&CKcon Power Hour - November
MITRE ATT&CKcon Power Hour - NovemberMITRE ATT&CKcon Power Hour - November
MITRE ATT&CKcon Power Hour - November
 
Data security in cloud
Data security in cloudData security in cloud
Data security in cloud
 
CyberSecurity - UH IEEE Presentation 2015-04
CyberSecurity - UH IEEE Presentation 2015-04CyberSecurity - UH IEEE Presentation 2015-04
CyberSecurity - UH IEEE Presentation 2015-04
 
Cyber Hacking & Security - IEEE - Univ of Houston 2015-04
Cyber Hacking & Security - IEEE - Univ of Houston 2015-04Cyber Hacking & Security - IEEE - Univ of Houston 2015-04
Cyber Hacking & Security - IEEE - Univ of Houston 2015-04
 
Cybersecurity | Risk. Impact. Innovations.
Cybersecurity | Risk. Impact. Innovations.Cybersecurity | Risk. Impact. Innovations.
Cybersecurity | Risk. Impact. Innovations.
 
2019 10-22 axio - taking control of cyber risk - grid-seccon
2019 10-22 axio - taking control of cyber risk - grid-seccon2019 10-22 axio - taking control of cyber risk - grid-seccon
2019 10-22 axio - taking control of cyber risk - grid-seccon
 
Armo webinar rethinking your cloud security in the shadow of the solar winds ...
Armo webinar rethinking your cloud security in the shadow of the solar winds ...Armo webinar rethinking your cloud security in the shadow of the solar winds ...
Armo webinar rethinking your cloud security in the shadow of the solar winds ...
 
DC970 Presents: Defense in Depth
DC970 Presents: Defense in DepthDC970 Presents: Defense in Depth
DC970 Presents: Defense in Depth
 
Securing Cloud from Cloud Drain
Securing Cloud from Cloud DrainSecuring Cloud from Cloud Drain
Securing Cloud from Cloud Drain
 
Cloud security Presentation
Cloud security PresentationCloud security Presentation
Cloud security Presentation
 
4-DDoS-DES-CEN451-BSE-Fall2023-16102023-082938pm (1).pdf
4-DDoS-DES-CEN451-BSE-Fall2023-16102023-082938pm (1).pdf4-DDoS-DES-CEN451-BSE-Fall2023-16102023-082938pm (1).pdf
4-DDoS-DES-CEN451-BSE-Fall2023-16102023-082938pm (1).pdf
 
Nuts & Bolts of the Dynamic Attack Chain
Nuts & Bolts of the Dynamic Attack ChainNuts & Bolts of the Dynamic Attack Chain
Nuts & Bolts of the Dynamic Attack Chain
 
IRJET- Security Attacks Detection in Cloud using Machine Learning Algorithms
IRJET- Security Attacks Detection in Cloud using Machine Learning AlgorithmsIRJET- Security Attacks Detection in Cloud using Machine Learning Algorithms
IRJET- Security Attacks Detection in Cloud using Machine Learning Algorithms
 
How to protect my cloud workload from Ransomware?
How to protect my cloud workload from Ransomware?How to protect my cloud workload from Ransomware?
How to protect my cloud workload from Ransomware?
 
Top Application Security Trends of 2012
Top Application Security Trends of 2012Top Application Security Trends of 2012
Top Application Security Trends of 2012
 
07 20251 latest trends, challenges ed
07 20251 latest trends, challenges ed07 20251 latest trends, challenges ed
07 20251 latest trends, challenges ed
 
6 e commerce security
6 e commerce security6 e commerce security
6 e commerce security
 
NETSCOUT Threat Intelligence Report: Findings Summary 1st half of 2018
NETSCOUT Threat Intelligence Report: Findings Summary 1st half of 2018 NETSCOUT Threat Intelligence Report: Findings Summary 1st half of 2018
NETSCOUT Threat Intelligence Report: Findings Summary 1st half of 2018
 

Mehr von kksrivastava1

Assignment4 Assignment 4 Hashtables In this assignment we w.pdf
Assignment4 Assignment 4 Hashtables In this assignment we w.pdfAssignment4 Assignment 4 Hashtables In this assignment we w.pdf
Assignment4 Assignment 4 Hashtables In this assignment we w.pdf
kksrivastava1
 
Assignment Overview Over twothirds of Americans are conside.pdf
Assignment Overview Over twothirds of Americans are conside.pdfAssignment Overview Over twothirds of Americans are conside.pdf
Assignment Overview Over twothirds of Americans are conside.pdf
kksrivastava1
 
Assignment is a case essay and requires you to obtain suffic.pdf
Assignment is a case essay and requires you to obtain suffic.pdfAssignment is a case essay and requires you to obtain suffic.pdf
Assignment is a case essay and requires you to obtain suffic.pdf
kksrivastava1
 

Mehr von kksrivastava1 (20)

Assume that there exists a bestfirst search algorithm in wh.pdf
Assume that there exists a bestfirst search algorithm in wh.pdfAssume that there exists a bestfirst search algorithm in wh.pdf
Assume that there exists a bestfirst search algorithm in wh.pdf
 
Assume that there are 5 processes P0 through P4 and 4 type.pdf
Assume that there are 5 processes P0 through P4 and 4 type.pdfAssume that there are 5 processes P0 through P4 and 4 type.pdf
Assume that there are 5 processes P0 through P4 and 4 type.pdf
 
Assume that there are 5 processes PO through P4 and 4 type.pdf
Assume that there are 5 processes PO through P4 and 4 type.pdfAssume that there are 5 processes PO through P4 and 4 type.pdf
Assume that there are 5 processes PO through P4 and 4 type.pdf
 
Assume that SLL is a singly linked list with the head node .pdf
Assume that SLL is a singly linked list with the head node .pdfAssume that SLL is a singly linked list with the head node .pdf
Assume that SLL is a singly linked list with the head node .pdf
 
Assume that i is in t0 register x is in f0 register the .pdf
Assume that i is in t0 register x is in f0 register the .pdfAssume that i is in t0 register x is in f0 register the .pdf
Assume that i is in t0 register x is in f0 register the .pdf
 
Assume that a simple random sample has been selected and tes.pdf
Assume that a simple random sample has been selected and tes.pdfAssume that a simple random sample has been selected and tes.pdf
Assume that a simple random sample has been selected and tes.pdf
 
Assume that a security model is needed to protect informatio.pdf
Assume that a security model is needed to protect informatio.pdfAssume that a security model is needed to protect informatio.pdf
Assume that a security model is needed to protect informatio.pdf
 
Assume that 352 of people have sleepwalked Assume that in.pdf
Assume that 352 of people have sleepwalked Assume that in.pdfAssume that 352 of people have sleepwalked Assume that in.pdf
Assume that 352 of people have sleepwalked Assume that in.pdf
 
assume Assume fn4n01gn10lognhn2npn3logn i.pdf
assume Assume fn4n01gn10lognhn2npn3logn i.pdfassume Assume fn4n01gn10lognhn2npn3logn i.pdf
assume Assume fn4n01gn10lognhn2npn3logn i.pdf
 
Assume an organization is planning to move a significant IT .pdf
Assume an organization is planning to move a significant IT .pdfAssume an organization is planning to move a significant IT .pdf
Assume an organization is planning to move a significant IT .pdf
 
Assume a singly linkedlist List class of nodes sorted by .pdf
Assume a singly linkedlist List class of nodes sorted by .pdfAssume a singly linkedlist List class of nodes sorted by .pdf
Assume a singly linkedlist List class of nodes sorted by .pdf
 
Assume a firm has earnings before depreciation and taxes of .pdf
Assume a firm has earnings before depreciation and taxes of .pdfAssume a firm has earnings before depreciation and taxes of .pdf
Assume a firm has earnings before depreciation and taxes of .pdf
 
Assignment4 Assignment 4 Hashtables In this assignment we w.pdf
Assignment4 Assignment 4 Hashtables In this assignment we w.pdfAssignment4 Assignment 4 Hashtables In this assignment we w.pdf
Assignment4 Assignment 4 Hashtables In this assignment we w.pdf
 
Assignment Overview Over twothirds of Americans are conside.pdf
Assignment Overview Over twothirds of Americans are conside.pdfAssignment Overview Over twothirds of Americans are conside.pdf
Assignment Overview Over twothirds of Americans are conside.pdf
 
Associativity Left to right 1 Show the order of evaluatio.pdf
Associativity Left to right 1 Show the order of evaluatio.pdfAssociativity Left to right 1 Show the order of evaluatio.pdf
Associativity Left to right 1 Show the order of evaluatio.pdf
 
ASSIGNMENT OI a The IASBs Framework for the Preparation a.pdf
ASSIGNMENT OI a The IASBs Framework for the Preparation a.pdfASSIGNMENT OI a The IASBs Framework for the Preparation a.pdf
ASSIGNMENT OI a The IASBs Framework for the Preparation a.pdf
 
Assignment is a case essay and requires you to obtain suffic.pdf
Assignment is a case essay and requires you to obtain suffic.pdfAssignment is a case essay and requires you to obtain suffic.pdf
Assignment is a case essay and requires you to obtain suffic.pdf
 
Assignment 4 Class Petromyzontida 10 List three features o.pdf
Assignment 4 Class Petromyzontida 10 List three features o.pdfAssignment 4 Class Petromyzontida 10 List three features o.pdf
Assignment 4 Class Petromyzontida 10 List three features o.pdf
 
Assign the ICD10CM codes to diagnosis and conditions and.pdf
Assign the ICD10CM codes to diagnosis and conditions and.pdfAssign the ICD10CM codes to diagnosis and conditions and.pdf
Assign the ICD10CM codes to diagnosis and conditions and.pdf
 
Assigned Topic Alzheimers disease Case study Create a b.pdf
Assigned Topic Alzheimers disease Case study  Create a b.pdfAssigned Topic Alzheimers disease Case study  Create a b.pdf
Assigned Topic Alzheimers disease Case study Create a b.pdf
 

Kürzlich hochgeladen

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
Chris Hunter
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
negromaestrong
 

Kürzlich hochgeladen (20)

Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 

Assignment 2 20 1 A company called XYZ Inc has recently m.pdf

  • 1. Assignment 2 20% 1. A company called XYZ Inc. has recently migrated its entire infrastructure to the cloud. However, they did not put enough emphasis on network security and have become a target for a cyber attack. The attackers were able to penetrate the company's network and access sensitive information, including customer data and financial information. a) How did the attackers gain access to the network? 5M b) Draw an attack tree threat modelling. 10M c) What was the impact of the attack on XYZ Inc.? 5M d) How can XYZ Inc. prevent similar attacks in the future?5M (25 Marks) 2. Scenario: A company's network is attacked by a hacker who gains access to sensitive information. a) How did the hacker gain access to the network? 5M b) What type of information was compromised in the attack? 5M c) How long did the hacker have access to the network? 5M d) What impact did the attack have on the company? 5M e) What measures can the company take to prevent future attacks? 5M (25 Marks) 3. a) Draw a web application security architecture. 12M b) How to countermeasure web security attacks? 8M (20 Marks)