Copy of [MAKE A COPY] Security 101 Challenge

.docx

School

University of Texas *

*We aren’t endorsed by this school

Course

BOOTCAMP

Subject

Information Systems

Date

Apr 3, 2024

Type

docx

Pages

6

Uploaded by CorporalMoose4126 on coursehero.com

Cybersecurity Threat Landscape Part 1: Crowdstrike 2021 Global Threat Report For Part 1 of your homework assignment, use the Crowdstrike 2021 Global Threat Report , along with independent research, to answer the following questions (remember to make a copy of this document to work on): 1. What was the dominant ransomware family that impacted the healthcare industry in 2020? Maze 2. Describe three different pandemic-related eCrime Phishing themes. 1.Emails, attackers impersonating the CDC. 2.Attacks on people working remotely. 3. Scams to give people protective gear online. 4. Which industry was targeted with the highest number of ransomware-associated data extortion operations? Education 5. What is WICKED PANDA? Where do they originate from? A Chinese cyber threat group of people. China. Cybersecurity Boot Camp Security 101 Challenge
6. Which ransomware actor was the first observed using data extortion in a ransomware campaign? Outlaw-Spider 7. What is an access broker? They have advanced social engineering scams to blend with normal users to sell credentials to make a quick profit. 8. Explain a credential-based attack. Attackers steal credentials to get access, bypass companies and organizations security measures and steal data. 9. Who is credited for the heavy adoption of data extortion in ransomware campaigns? Twisted Spider 10.What is a DLS? Data Leak Site- When data is compromised by threat actors to obtain information and extort money from businesses. 11.According to Crowdstrike Falcon OverWatch, what percentage of intrusions came from eCrime intrusions in 2020? 80% 12.Who was the most reported criminal adversary of 2020? Wizard Spider 13.Explain how SPRITE SPIDER and CARBON SPIDER impacted virtualization infrastructures. They allow users to create vm’s on a single computer.
14.What role does an Enabler play in an eCrime ecosystem? They give criminal actors capabilities they couldn't get on their own. 15.What are the three parts of the eCrime ecosystem that CrowdStrike highlighted in their report? Circuit Panda, Wizard Panda, and Phantom Panda 16.What is the name of the malicious code used to exploit a vulnerability in the SolarWinds Orion IT management software? Sunburst Part 2: Akamai Security Year in Review 2020 In this part, you should primarily use the Akamai Security Year in Review 2020 and Akamai State of the Internet / Security , along with independent research, to answer the following questions. 1. What was the most vulnerable and targeted element of the gaming industry between October 2019 and September 2020? The players 2. From October 2019 to September 2020, in which month did the financial services industry have the most daily web application attacks? December 3. What percentage of phishing kits monitored by Akamai were active for only 20 days or less? 60% 4. What is credential stuffing?
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help