Professional Documents
Culture Documents
Objectives
Research and analyze cyber security
incidents.
Background / Scenario
The FBI has estimated that cybercrime
cost individuals and companies over
3.5 billion dollars in 2019.
Governments, businesses, and
individual users are increasingly the
targets of cyberattacks and
cybersecurity incidents are becoming
more common.
In this lab, you will create three
hypothetical cyber attackers, each with
an organization, an attack, a motive. In
addition, suggest a method by which
2018 - 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 1 of 8 www.netacad.com
Lab - Visualizing the Black Hats
2018 - 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 2 of 8 www.netacad.com
Lab - Visualizing the Black Hats
Instructions
Scenario 1:
a. Who is the attacker?
Ans: An employee at Target that
lost his job and tends to seek
revenge amongst the company.
b. What organization or group is the
attacker associated with, if any?
Ans: The employee is part of a
skilled computer group that will
use their skills to destroy
confidential data.
c. What is the motive of the attacker?
Ans: Acquire confidential data
from users across the industry..
d. What method of attack was used?
Ans: The attacker uses a phishing
method for its targets.
2018 - 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 3 of 8 www.netacad.com
Lab - Visualizing the Black Hats
2018 - 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 4 of 8 www.netacad.com
Lab - Visualizing the Black Hats
2018 - 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 5 of 8 www.netacad.com
Lab - Visualizing the Black Hats
2018 - 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 7 of 8 www.netacad.com
Lab - Visualizing the Black Hats
End of document
2018 - 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 8 of 8 www.netacad.com