Copy of _ Dylan T __ Security 101 Challenge_

.pdf

School

University of Texas, San Antonio *

*We aren’t endorsed by this school

Course

MISC

Subject

Information Systems

Date

Dec 6, 2023

Type

pdf

Pages

6

Uploaded by DeanDangerWombat38

Report
Cybersecurity Threat Landscape Part 1: Crowdstrike 2021 Global Threat Report For Part 1 of your homework assignment, use the Crowdstrike 2021 Global Threat Report , along with independent research, to answer the following questions (remember to make a copy of this document to work on): 1. What was the dominant ransomware family that impacted the healthcare industry in 2020? [Maze] 2. Describe three different pandemic-related eCrime Phishing themes. [Misleading healthy and safety emails, credential harvesting, and attacking employees who work at home.] 3. Which industry was targeted with the highest number of ransomware-associated data extortion operations? [Industrial and Engineering Sector] 4. What is WICKED PANDA? Where do they originate from? [Wicked Panda is chinese based cyber group that operates a group for hire]
5. Which ransomware actor was the first observed using data extortion in a ransomware campaign? [Outlaw Spider] 6. What is an access broker? [An Access Broker are actors that gain hack organizations and sells their info through a private channel or criminal forms] 7. Explain a credential-based attack. [Credential-based attacks are people who hack and steal companies credentials to have access to companies security and major info logs, once the hacker has access, they steal info for that company.] 8. Who is credited for the heavy adoption of data extortion in ransomware campaigns? [Twisted Spider] 9. What is a DLS? [DLS is a resource that can send out links to people who are on the internet.] 10.According to Crowdstrike Falcon OverWatch, what percentage of intrusions came from eCrime intrusions in 2020? [79%] 11. Who was the most reported criminal adversary of 2020? [Wizard Spider] 12.Explain how SPRITE SPIDER and CARBON SPIDER impacted virtualization infrastructures.
[They both came together to develop a ransomware version of Linux that affects ESXI hosts.] 13.What role does an Enabler play in an eCrime ecosystem? [An Enabler provides criminals with resources they might not have. Run malware as a service and?/or sell info they gained. 14.What are the three parts of the eCrime ecosystem that CrowdStrike highlighted in their report? [Monetization, Services, and Distributions.] 15.What is the name of the malicious code used to exploit a vulnerability in the SolarWinds Orion IT management software? [Sunburst.] Part 2: Akamai Security Year in Review 2020 In this part, you should primarily use the Akamai Security Year in Review 2020 and Akamai State of the Internet / Security , along with independent research, to answer the following questions. 1. What was the most vulnerable and targeted element of the gaming industry between October 2019 and September 2020? [The Gamers] 2. From October 2019 to September 2020, in which month did the financial services industry have the most daily web application attacks? [December 2019]
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help