Question

In: Computer Science

Assume a scenario where the hackers gained access to information through malware on Point-of-Sale (POS) systems...

Assume a scenario where the hackers gained access to information through malware on Point-of-Sale (POS) systems of more than million credit and debit card. The firewall had captured the first malware code and an alert was issued which was ignored. The hackers started downloading the collected data. The cyber criminals have hacked the system to gain credit and debit card information.

1. Explain in your own words what happened in the above discussed data breach. [5 Marks]

2. Identify and experience the type of attack experienced in the above scenario [2 Marks]

3. The stolen credentials alone are not enough to access the company’s POS devices. What other means can the hackers acquire to allow them to navigate the company’s network and deploy the malware. [3 Marks]

4. What would have hackers done for privilege escalation? [2 Marks]

5. The organization admitted that they ignored many alerts from their network security devices because of alert overload. If you are the organization’s Chief Technical Officer (CTO), what would you do to reduce the problem of alert overload? [3 Marks]

6. The security experts criticize the organization for failing to isolate sensitive sections of their networks from those more easily accessible to outsiders. As a CTO, please propose a feasible solution to segment and categorize your networks and resources. [5 Marks]

please solve it as fast as you can and the subject is cyber security.

Solutions

Expert Solution

1.

The hackers tried to get the details of the credit and debit cards of different users by breaching the security which was caught by the firewall, in the first place, but the threat was been ignored by the authorities, which lead to critical information of credit cards, being leaked, which the hackers can use according to their wish and if the hacker succeeds then the hacker can use it for all their use as and when required and the bill of the usage will have to be paid by the real owner of the credit card.

2.

The attack that the system faced was interception. The hacker intercepted in the system and took all the data of the credit card of the users to either sell or use it for their own usage. Then the hacker will be masquerading as the original user to use the credit or debit card the bill of the same will have to be paid by the original owner.

3.

There are system cards that are owned by the users that are needed to access the system. This will be necessary for accessing the system. If the hacker somehow manages to get this then the hacker can easily access everything. And also, the one-time pin is also mandatory for the access. If the hacker gets that then the owner of the credit card will be in huge losses.

4.

The hackers would have masqueraded as someone else to get through the security, but that eventually was not perfect as the firewall caught it, but as the threat informed was ignored, that lead to threats to the user's critical information that will be misused by the hacker.


Related Solutions

Assume a scenario where the hackers gained access to information through malware on Point-of-Sale (POS) systems...
Assume a scenario where the hackers gained access to information through malware on Point-of-Sale (POS) systems of more than million credit and debit card. The firewall had captured the first malware code and an alert was issued which was ignored. The hackers started downloading the collected data. The cyber criminals have hacked the system to gain credit and debit card information. 1. Explain in your own words what happened in the above discussed data breach. [5 Marks] 2. Identify and...
Assume a scenario where the hackers gained access to information through malware on Point-of-Sale (POS) systems...
Assume a scenario where the hackers gained access to information through malware on Point-of-Sale (POS) systems of more than million credit and debit card. The firewall had captured the first malware code and an alert was issued which was ignored. The hackers started downloading the collected data. The cyber criminals have hacked the system to gain credit and debit card information. 1. Explain in your own words what happened in the above discussed data breach. [5 Marks] 2. Identify and...
Assume a scenario where the hackers gained access to information through malware on Point-of-Sale (POS) systems...
Assume a scenario where the hackers gained access to information through malware on Point-of-Sale (POS) systems of more than million credit and debit card. The firewall had captured the first malware code and an alert was issued which was ignored. The hackers started downloading the collected data. The cyber criminals have hacked the system to gain credit and debit card information. 1. Explain in your own words what happened in the above discussed data breach. [5 Marks] 2. Identify and...
Assume a scenario where the hackers gained access to information through malware on Point-of-Sale (POS) systems...
Assume a scenario where the hackers gained access to information through malware on Point-of-Sale (POS) systems of more than million credit and debit card. The firewall had captured the first malware code and an alert was issued which was ignored. The hackers started downloading the collected data. The cyber criminals have hacked the system to gain credit and debit card information. 1. Explain in your own words what happened in the above discussed data breach. 2. Identify and experience the...
Assume a scenario where the hackers gained access to information through malware on Point-of-Sale (POS) systems...
Assume a scenario where the hackers gained access to information through malware on Point-of-Sale (POS) systems of more than million credit and debit card. The firewall had captured the first malware code and an alert was issued which was ignored. The hackers started downloading the collected data. The cyber criminals have hacked the system to gain credit and debit card information. 1. Explain in your own words what happened in the above discussed data breach. 2. Identify and experience the...
Assume you are designing a retail point-of-sale (POS) system for your company. What are the typical...
Assume you are designing a retail point-of-sale (POS) system for your company. What are the typical system interfaces of a point-of-sale system that need to be taken into account in designing the POS system?
Point-of-sale (POS) system is used in Fiesta, a local supermarket. The supermarket maintains no credit sales;...
Point-of-sale (POS) system is used in Fiesta, a local supermarket. The supermarket maintains no credit sales; all transactions are paid using cash or credit/debit cards. The inventories are kept on the supermarket’s shelves. Customers pick the items they wish to buy and carry them to the checkout counter where the transaction begins. First, the checkout clerk scans the bar codes printed on the items with a scanner. The scanner, which is the primary input device in the POS system, is...
Scenario Information: Assume that two gas stations are for sale with the following cash flows: CF1...
Scenario Information: Assume that two gas stations are for sale with the following cash flows: CF1 is the Cash Flow in the first year, and CF2 is the Cash Flow in the second year. This is the timeline and data used in calculating the Payback Period, Net Present Value, and Internal Rate of Return. The calculations are done for you. Your task is to select the best project and explain your decision. The methods are presented and the decision each...
Assume a coordinate system where the origin is the point where supply pack is released, the...
Assume a coordinate system where the origin is the point where supply pack is released, the positive x axis is the direction the plane is flying and the positive y axis points downward.   Assume the horizontal and vertical components of the air resistance are proportional to the square of the velocities Using the appropriate model using accuracy to the nearest foot rounding off at the end of the problem, determine the horizontal distance the pack travels assuming The plane altitude...
Microsoft Access 2016: Computer Information Systems What are the advantages of including a caption for a...
Microsoft Access 2016: Computer Information Systems What are the advantages of including a caption for a form? Do you need both a caption and a title? Why or Why not? What other elements do you think should be standard on a data entry form used by an organization?
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT