You are on page 1of 8

Lab - Visualizing the Black Hats

Objectives
Research and analyze cyber security
incidents.
Background / Scenario
The FBI has estimated that cybercrime
cost individuals and companies over
3.5 billion dollars in 2019.
Governments, businesses, and
individual users are increasingly the
targets of cyberattacks and
cybersecurity incidents are becoming
more common.
In this lab, you will create three
hypothetical cyber attackers, each with
an organization, an attack, a motive. In
addition, suggest a method by which

 2018 - 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 1 of 8 www.netacad.com
Lab - Visualizing the Black Hats

an organization could prevent or


mitigate the attack.
Note: You can use the web browser in
the virtual machine that was installed
in a previous lab to research security
issues. By using the virtual machine,
you may prevent malware from being
installed on your computer.
Required Resources
 PC or mobile device with internet
access and virtual machine (optional)

 2018 - 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 2 of 8 www.netacad.com
Lab - Visualizing the Black Hats

Instructions
Scenario 1:
a. Who is the attacker?
Ans: An employee at Target that
lost his job and tends to seek
revenge amongst the company.
b. What organization or group is the
attacker associated with, if any?
Ans: The employee is part of a
skilled computer group that will
use their skills to destroy
confidential data.
c. What is the motive of the attacker?
Ans: Acquire confidential data
from users across the industry..
d. What method of attack was used?
Ans: The attacker uses a phishing
method for its targets.
 2018 - 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 3 of 8 www.netacad.com
Lab - Visualizing the Black Hats

e. What was the target and


vulnerability used against the
business?
Ans: The target was employees,
managers and shareholders
working at the company. They
have found a lack of security of
staff's emails.
f.How could this attack be prevented
or mitigated?
Ans: Adding a multifactor
authentication onto the emails will
decrease the chance of emails
being hacked.
Scenario 2:
a. Who is the attacker?
Ans: An ex student from RMIT

 2018 - 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 4 of 8 www.netacad.com
Lab - Visualizing the Black Hats

b. What organization/group is the


attacker associated with?
Ans: The student is part a money
grinding group with skilled
networking workers.
c. What is the motive of the attacker?
Ans: The attacker wants to help
students at RMIT with their
assignments by hacking into the
network and stealing the answers.
d. What method of attack was used?
Ans: The attacker uses the sniffing
method at RMIT networks.
e. What was the target and
vulnerability used against the
business?

 2018 - 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 5 of 8 www.netacad.com
Lab - Visualizing the Black Hats

Ans: The target was the teacher's


personal network. They had found
opened loops within the network.
f.How could this attack be prevented
or mitigated?
Ans: Close any opened loops that
are not associated within the
network.
Scenario 3:
a. Who is the attacker?
Ans: A young intern who got fired
from a networking company.
b. What organization/group is the
attacker associated with?
Ans: This person works for
himself and doesn't require a team
to support him.
c. What is the motive of the attacker?
 2018 - 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 6 of 8 www.netacad.com
Lab - Visualizing the Black Hats

Ans: Stealing data and information


from the network to sell it for
money.
d. What method of attack was used?
Ans: The hacker installed a
spyware onto the system while
using the same account within the
network.
e. What was the target and
vulnerability used against the
business?
Ans: The target was users
personal information. The hacker
used the same login details from
the company he used to work for.
f.How could this attack be prevented
or mitigated?

 2018 - 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 7 of 8 www.netacad.com
Lab - Visualizing the Black Hats

Ans: The company needed to


delete any users that are not
associated with the business. This
results in less users accessing the
network.
Type your answers here.

End of document

 2018 - 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 8 of 8 www.netacad.com

You might also like