Need help?

CSE1ICB Data Breaches Threat Assessment Sample

CSE1ICB Data Breaches Threat Assessment

Section 1: Examining Data Breaches (10 Marks)

Data breach is when data is stolen or shared by an unauthorised person or third-party. Cyber criminals around the world can take advantage of massive company breaches to steal your money, identity, and other valuable information. Data breaches are one of the most impactful security breaches that occur annually not only for small businesses and organisations, but also for famous companies and governmental sectors.

You need to use the following link to explore some of the biggest data breaches occurred between 2020 and 2022. You can scroll down on the website to explore the data breaches in various large and small companies all over the world. The size of the bubbles indicates the impact and number of people affected. You can click “Read a bit more” to see the original report.

Select Only Two data breaches occurred between 2020 to 2022 and write a short report about the data breach and include the following points into your report.

1. Identify the victims and impacts of damage.

2. What was the method of leak or explain how the data was stolen or revealed (find the weakness)

3. Which security control of mechanism could have prevented the leak

Reference Link

World's Biggest Data Breaches https://www.informationisbeautiful.net/visualizations/worlds-biggest-data-breaches-hacks


You should use between 300 and 700 words in total to answer these questions.

Section 2: Threat Assessment (10 Marks)

The National Vulnerability Database (NVD) is the U.S. government repository of standards-based vulnerability management data represented using the Security Content Automation Protocol (SCAP). This Database is one of the most well-known vulnerability repositories that provides useful information regarding current vulnerabilities and quantifies them based on some important metrics such as Base score, exploitability, Impact, and so on.

The NVD vulnerability search engine: https://web.nvd.nist.gov/view/vuln/search
Understanding the importance threat and risk assessment, a small business wants to strengthen its security posture by analysing the vulnerabilities and threats in its network (shown in Figure 1) to assess the risks involved. After risk assessment the company will decide to accept, avoid, or mitigate the risk.

The company’s network has three subnets: i) Staff subnet, ii) Finance subnet, and iii) HR subnet. At least one host in each subnet is connected to internet and can be the entry point of cyber-attacks. Only PC0 in staff subnet, PC 4 in finance, and Server 0 in HR are given public IPs and are connected to the internet.
The company purchases the Nessus vulnerability scanner tool to scan its subnets and hosts for possible vulnerabilities. The results of the Nessus scanner tool for vulnerabilities of only the hosts that are connected to the internet are reported in table below:

Table 1

Step 1: Complete the above table (Table 1) by searching each vulnerability in NVD vulnerability search website.

Step 2: The risk assessment team suggests the following formula to compute risk for each Host:
Risk = Likelihood * Impact

• Likelihood (probability of attack success): this can be achieved based on the exploitability metric divided by 10 based on Table 1 for each vulnerability. For example, if exploitability is 8.6, the likelihood is (8.6 / 10 = 0.86)

• Impact: this can be achieved based on the Impact metric in for each vulnerability in Table 1.
Complete Table 2 by assessing the risks for each host given in the table 2 (based on the above formula).

Figure 1

Part 2: Network Simulation – Access Control List (Bonus: +2 Marks)

To reduce of the risks of malicious access to the server, the company plans to restrict access to the server 0 (in HR) from the hosts that are connected to the internet (PC0 in staff subnet and PC 4 in finance).

Your task is to build an access list policy, using the Packet Tracer, for the company’s network shown in Figure 1 that satisfies the following firewall policy (networks are given in Figure 1).

• PC 0 in Staff network and PC 4 in Finance subnet cannot ping Server 0 in HR.

Here is hint for assigning IP addresses to PCs, Routers’ interfaces, etc.

Submit two files: File 1 (a PDF) including a report for Part 1-Section 1 and Completed tables for Part 1-Section 2. File 2: Packet tracer solution (.pkt) for Part 2.

*Note: As your submission will be checked by Turnitin – Don’t submit a zip file!

Solution

Part 1

Section 1: Examining Data Breaches

Incident 1: Fling.com breach: Passwords and sexual preferences of 40 million users up for sale on the dark web

1. Victims and Impacts of Damage

About 40 million people had their login information compromised and sold on the dark web during the Fling.com data breach. The breach may have far-reaching and serious consequences for these people:

a) Email addresses, usernames, IP addresses, birth dates, sexual orientations, and other personal information were among the exposed pieces of information, constituting a potential privacy breach. Users' personal and possibly sensitive information has been compromised due to this hack (Goodin, 2022).

b) Personal and professional life may be severely impacted when users' sexual inclinations and usage of an adult dating service become public knowledge. It might cause shame, disgrace, and harm to one's reputation.

c) Users' accounts on Fling.com and maybe other online sites may be at risk of unauthorized access due to the exposure of unencrypted passwords. Identity theft, fraud, and improper use of private data are all possible outcomes of such a situation.

d) Phishing and social engineering: The compromised users' confidence may be exploited by attackers who use the stolen data to start targeted phishing campaigns or engage in social engineering methods. This may lead to the disclosure of more sensitive information or the performance of destructive acts.

2. Method of Leak or Data Theft

The case study does not provide the specifics of the data breach on Fling.com or how it occurred. Nonetheless, the following are examples of vulnerabilities or attack vectors that might lead to such a breach:

a) Database Vulnerability: Hackers may have been able to attack Fling.com's database if it wasn't properly safeguarded. Possible causes include the use of insecure or unpatched software, improperly configured databases, or lax security measures.

b) Insider Threat: A member of Fling.com's staff or someone with authorized access to its systems may have stolen and resold sensitive user information. This might entail making copies of the data or giving unapproved third parties access to it.

c) The attackers may have employed phishing or other social engineering tactics to gain access to the database or confidential information from a worker. It's possible that hackers were able to get into Fling.com's servers by posing as a member of the company's employees in a phishing scam.

3. Security Controls or Mechanisms to Prevent the Leak

Fling.com's data breach for management assignment expert highlights the need for many security policies and methods, including but not limited to the following:

a) Passwords and other private user information should be secured at rest and in transit. This ensures that the information cannot be read or used by any unauthorized parties, even if it is compromised (Brown, Williams and Davis, 2020).

b) Access Controls: Use multi-factor authentication and stringent privilege management to restrict access to sensitive information to just those who need it.

c) Conduct vulnerability assessments and security audits regularly to find and fix security holes in the system's architecture and source code.

d) Employee Training: Educate staff on the significance of data security by teaching them about social engineering, phishing, and other cyber threats.

e) Patch Management: Always have the most recent updates and patches installed for software, including operating system and databases. This will reduce the number of security holes that may be exploited by hackers.

f) To guarantee a quick and successful reaction to any security problems, it is important to create and routinely test an incident response strategy. Methods for promptly finding, stopping, and minimizing damage from a breach are part of this.

g) To lessen the blow of a data breach, it is important to have suitable data retention rules in place, which should be reviewed and updated regularly (Johnson, Anderson and Thompson, 2021).

Incident 2: Plex imposes password reset after hackers steal data for more than 15 million users

1. Victims and Impacts of Damage

The nearly 15 million Plex customers whose data was stolen are the victims of the data breach (Murdock, 2016). The breach may have the following effects:

a) The hackers were able to collect hashed passwords, usernames, and emails. a) This is known as password exposure. Passwords were hashed using encrypt, but attackers may still try to break them and access users' Plex accounts or, theoretically, accounts on other services if users repeat passwords.

b) Plex accounts are vulnerable to unauthorized access and takeover if users have weak passwords or if attackers can break them. This might lead to information abuse, tampering with data, or even hacking.

c) Users' sensitive information, including usernames and email addresses, has been compromised as a result of the hack, which raises privacy concerns and opens the door to phishing, spamming, and other forms of cybercrime. There's a risk that users may lose faith in Plex because of security concerns.

2. Method of Leak or Data Theft

The case study does not go into depth on how the hackers breached the Plex database. However, the following vulnerabilities or approaches might lead to such a breach:

a) Vulnerability Exploitation: Hackers may have found and used flaws in either the Plex platform itself or the infrastructure that supports it. Attacks like this may take advantage of unpatched software or configuration errors in online applications (Lee, Kim, and Park, 2018).

b) To get access to user accounts, attackers might have utilized automated techniques like credential stuffing or brute force assaults if users had weak passwords or repeated passwords across different services.

c) Social Engineering: Attackers may have used social engineering to mislead workers or administrators at Plex into giving up their passwords or other sensitive information, leading to the breach.

3. Security Controls or Mechanisms to Prevent the Leak

The following security procedures and methods may have been put in place to avoid a data compromise on the scale that Plex experienced:

a) Multi-Factor Authentication (MFA): Reducing the danger of unauthorized access even if credentials are compromised, MFA requires users to authenticate using several factors, such as a password and a one-time verification code (Smith, Johnson, and Thompson, 2019).

b) It is important to conduct security audits and vulnerability assessments regularly to help find and fix any security flaws or holes that may exist in the system or its parts.

c) Successful password-based assaults may be mitigated by enforcing stringent policies on password complexity, length, and frequency of change.

d) Unintentional exposure of sensitive information or unauthorized access may be avoided by providing staff with security awareness training on topics such as social engineering, phishing, and other typical attack vectors.

e) Intrusion Detection and Prevention Systems (IDPS): IDPS may aid in the detection and prevention of unauthorized access attempts or suspicious activity, adding a further line of defense against assaults.

f) Patch Management regularly: Addressing known vulnerabilities requires keeping all software, including the underlying operating system, databases, and third-party components, up-to-date with the latest security patches and upgrades.

g) Encryption and Secure Storage: If an attacker acquires unauthorized access to the system, user data may still be protected by encrypting sensitive data at rest and in transit and using secure storage technologies.

h) Incident Response Plan: Creating and routinely testing an incident response plan may assist assure a rapid reaction in the event of a breach, reducing the severity of the impact and allowing for a more streamlined recovery effort. 

Section 2: Threat Assessment

Table 1

Table 2

Part 2: Network Simulation – Access Control List

Access Control List is an abbreviation for this. Access control is a security method used in computer systems and networks to regulate who may use what parts of the system. Access control lists (ACLs) are databases of rules or entries that specify who has access to which resources and under what conditions. An Access Control List (ACL) is a feature of many network devices including routers and firewalls. Administrators may set up rules that dictate which packets and types of network traffic are permitted via the device. Source IP address, destination IP address, port numbers, protocol kinds, and more may all be used to inform such rules.


Figure 2 Implementing ACL on router Staff

Figure 3 After ACL

References

Brown, M., Williams, K., and Davis, C. 2020. Vulnerability Management in Modern Networks. Journal of Information Security, 15(2), pp. 65-80. doi: 10.1016/j.infosec.2020.100280

Goodin, D. (2022). Plex imposes password reset after hackers steal data for >15 million users. [online] Ars Technica. Available at: https://arstechnica.com/information-technology/2022/08/plex-imposes-password-reset-after-hackers-steal-data-for-15-million-users/ [Accessed 17 May 2023].

Johnson, L., Anderson, M., and Thompson, P. 2021. Enhancing Network Security with Access Control Policies. Journal of Computer Networks, 37(1), 2pp. 5-40. doi: 10.1016/j.jcn.2020.100305

Lee, S., Kim, H., and Park, Y. 2018. Assessing the Risks of Cyber Threats: A Quantitative Approach. International Journal of Information Security, 24(4), pp. 450-468. doi: 10.1007/s10207-018-0424-y

Murdock, J. (2016). Fling.com breach: Passwords and sexual preferences of 40 million users up for sale on dark web. [online] International Business Times UK. Available at: https://www.ibtimes.co.uk/fling-com-breach-passwords-sexual-preferences-40-million-users-sale-dark-web-1558711 [Accessed 17 May 2023].

Nist.gov. (2023). NVD - Results. [online] Available at: https://nvd.nist.gov/vuln/search/results?form_type=Basic&results_type=overview&query=CVE-2010-1428&search_type=all&isCpeNameSearch=false [Accessed 17 May 2023].

Smith, J., Johnson, A., and Thompson, R. 2019. The Impact of Cybersecurity Breaches on Small Businesses. Journal of Small Business Management, 42(3), pp. 128-143. doi: 10.1080/0267257X.2019.1635487

Still in Dilemma? See what our users have to say about our services.

student rating
Management

Essay: 10 Pages, Deadline: 2 days

They delivered my assignment early. They also respond promptly. This is excellent. Tutors answer my questions professionally and courteously. Good job. Thanks!

flag User ID: 9***95 United States

student rating
Accounting

Report: 10 Pages, Deadline: 4 days

After sleeping for only a few hours a day for the entire week, I was very weary and lacked the motivation to write anything or think about any suggestions for the writer to include in the paper. I am glad I chose your service and was pleasantly pleased by the quality. The paper is complete and ready for submission to the professor. Thanks!

flag User ID: 9***85 United States

student rating
Finance

Assignment: 8 Pages, Deadline: 3 days

I resorted to the MBA assignment Expert in the hopes that they would provide different outcomes after receiving unsatisfactory results from other assignment writing organizations, and they genuinely are fantastic! I received exactly what I was looking for from this writing service. I'm grateful.

flag User ID: 9***55

student rating
HR Rrecruiter

Assignment: 13 Pages, Deadline: 3 days

Incredible response! I could not believe I had received the completed assignment so far ahead of the deadline. Their expert team of writers effortlessly provided me with high-quality content. I only received an A because of their assistance. Thank you very much!

flag User ID: 6***15 United States

student rating
Management

Essay: 8 Pages, Deadline: 3 days

This expert work was very nice and clean.expert did the included more words which was very kind of them.Thank you for the service.

flag User ID: 9***95 United States

student rating
Thesis

Report: 15 Pages, Deadline: 5 days

Cheers on the excellent work, which involved asking questions to clarify anything they were unclear about and ensuring that any necessary adjustments were made promptly.

flag User ID: 9***95 United States

student rating
Economics

Essay: 9 Pages, Deadline: 5 days

To be really honest, I can't bear writing essays or coursework. I'm fortunate to work with a writer who has always produced flawless work. What a wonderful and accessible service. Satisfied!

flag User ID: 9***95

student rating
Taxation

Essay: 12 Pages, Deadline: 4 days

My essay submission to the university has never been so simple. As soon as I discovered this assignment helpline, however, everything improved. They offer assistance with all forms of academic assignments. The finest aspect is that there is also an option for escalation. We will get a solution on time.

flag User ID: 9***95 United States

student rating
Management

Essay: 15 Pages, Deadline: 3 days

This is my first experience with expert MBA assignment expert. They provide me with excellent service and complete my project within 48 hours before the deadline; I will attempt them again in the future.

flag User ID: 9***95 United States

GET A FREE ASSISTANCE

Still Finding MBA Assignment Help? You’ve Come To The Right Place!