You are on page 1of 2

Homer A.

Vitriolo
BSIT – 3A
Ransomware Infection
Ransomware, a type of malicious software, has spread throughout the digital landscape. This type of
cyberattack encrypts a victim's files, rendering them inaccessible until a ransom, usually in
cryptocurrency, is paid to the attacker. The reasons for ransomware attacks range from monetary gain to
causing disruption and chaos. Attackers frequently target individuals, businesses, and even government
organisations, taking advantage of flaws in security protocols. A successful ransomware attack can result
in data loss, financial losses, and a potential breach of sensitive information.
Incident of a Ransomware Attack
Critical Systems at City Hospital are being held hostage.
In October 2021, City Hospital was the target of a sophisticated ransomware attack. The attackers took
advantage of a flaw in the hospital's network to encrypt vital patient records, medical histories, and
administrative files. The perpetrators demanded a large ransom for the decryption key, threatening to
delete the data permanently if the hospital did not comply. The attack severely hampered hospital
operations, resulting in patient care delays, appointment cancellations, and financial losses. City Hospital
worked tirelessly with cybersecurity experts to restore the encrypted data and strengthen its security
measures to prevent future attacks.
Insider Danger
A security risk that originates within an organisation, involving employees, contractors, or other
individuals with privileged access, is referred to as an insider threat. Employees leaking sensitive
information to malicious insiders causing harm are examples of intentional and unintentional threats.
Insider threats pose a significant challenge to organisations, necessitating the use of both technological
solutions and stringent internal policies to mitigate risks.
Incident of Insider Threat
Trade secrets of a technology company have been compromised.
An insider threat jeopardised a leading technology company's proprietary software source code in a recent
incident. A disgruntled employee who had privileged access to the company's servers leaked valuable
trade secrets to a competitor in order to sully the company's reputation and gain a competitive advantage.
The leak led to a legal battle, financial losses, and a tarnished reputation for the technology company.
This incident emphasises the significance of continuous monitoring, employee training, and strict access
controls in preventing and mitigating insider threats.
SQL Injection Exploit
SQL injection is a type of cyber attack in which malicious SQL code is inserted into web application
input fields to exploit vulnerabilities in the application's database layer. This attack allows hackers to
manipulate the database and perform unauthorised actions, potentially gaining access to sensitive
information or jeopardising the data's integrity.
Incident of SQL Injection
A data breach has occurred on an e-commerce site.
A popular e-commerce website recently experienced a significant data breach as a result of a SQL
injection attack, which exposed customer information such as personal information and payment card
data. The attackers used a flaw in the website's code to inject malicious SQL queries, allowing them to
circumvent security measures and gain unauthorised access to the customer database. The compromised
data was then sold on the dark web, resulting in financial losses for affected customers and reputational
harm for the e-commerce site. This incident emphasises the significance of secure coding practices and
regular security audits in preventing SQL injection attacks.
In our increasingly interconnected digital world, raising awareness of these cyber threats and
implementing proactive cybersecurity measures are critical to protecting individuals, organisations, and
society as a whole.

You might also like