Copy of [MAKE A COPY] Security 101 Challenge
.docx
keyboard_arrow_up
School
University of Texas *
*We aren’t endorsed by this school
Course
BOOTCAMP
Subject
Information Systems
Date
Apr 3, 2024
Type
docx
Pages
6
Uploaded by CorporalMoose4126 on coursehero.com
Cybersecurity Threat Landscape
Part 1: Crowdstrike 2021 Global Threat Report
For Part 1 of your homework assignment, use the Crowdstrike 2021 Global Threat Report
,
along with independent research, to answer the following questions (remember to make a copy of this document to work on):
1.
What was the dominant ransomware family that impacted the healthcare industry
in 2020?
Maze
2.
Describe three different pandemic-related eCrime Phishing themes.
1.Emails, attackers impersonating the CDC.
2.Attacks on people working remotely.
3.
Scams to give people protective gear online.
4.
Which industry was targeted with the highest number of ransomware-associated data extortion operations?
Education
5.
What is WICKED PANDA? Where do they originate from?
A Chinese cyber threat group of people. China.
Cybersecurity Boot Camp
Security 101 Challenge
6.
Which ransomware actor was the first observed using data extortion in a ransomware campaign?
Outlaw-Spider
7.
What is an access broker? They have advanced social engineering scams to blend with normal users to sell credentials to make a quick profit.
8.
Explain a credential-based attack.
Attackers steal credentials to get access, bypass companies and organizations security measures and steal data.
9.
Who is credited for the heavy adoption of data extortion in ransomware campaigns?
Twisted Spider
10.What is a DLS?
Data Leak Site- When data is compromised by threat actors to obtain information and extort money from businesses.
11.According to Crowdstrike Falcon OverWatch, what percentage of intrusions came from eCrime intrusions in 2020? 80%
12.Who was the most reported criminal adversary of 2020? Wizard Spider
13.Explain how SPRITE SPIDER and CARBON SPIDER impacted virtualization infrastructures.
They allow users to create vm’s on a single computer.
14.What role does an Enabler play in an eCrime ecosystem?
They give criminal actors capabilities they couldn't get on their own.
15.What are the three parts of the eCrime ecosystem that CrowdStrike highlighted in
their report?
Circuit Panda, Wizard Panda, and Phantom Panda
16.What is the name of the malicious code used to exploit a vulnerability in the SolarWinds Orion IT management software?
Sunburst
Part 2: Akamai Security Year in Review 2020
In this part, you should primarily use the Akamai Security Year in Review 2020 and Akamai State of the Internet / Security
,
along with independent research, to answer the following questions.
1.
What was the most vulnerable and targeted element of the gaming industry between October 2019 and September 2020? The players
2.
From October 2019 to September 2020, in which month did the financial services
industry have the most daily web application attacks? December
3.
What percentage of phishing kits monitored by Akamai were active for only 20 days or less? 60%
4.
What is credential stuffing?
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help