Question

In: Computer Science

find some type of combuter attack that happend. and include a good explanation for these questions:...

find some type of combuter attack that happend.
and include a good explanation for these questions:
who dose the attack?
what was the attack, and what was taken?
where did that happen ?
how did that happen ?
why did it happen ?
why did I pick this type of attack ?

Solutions

Expert Solution

Attack On Sony: This was the attack in which there were many files which were taken.

  • The attack was done by hackers who knew about the vulnerability of the sony systems and their encryption.
  • In this, the attack was SQL injection and in this many un-encrypted files of the users were taken and then as the compensation, they had to provide money to their users.
  • It happened in JAPAN.
  • The hackers did SQL injection on the data which they collected from their servers in order to find the required information.
  • Due to the negligence of Sony who loaded the saved the user data unencrypted which made it easy for hackers to implement SQL injection in order to decrypt it and find the information.
  • As this attack is very close to real-life where we put our personal details, our bank details which are sometimes not stored properly by the companies we trust most. Thus I have chosen this attack.

That was a nice question to answer
Friend, If you have any doubts in understanding do let me know in the comment section. I will be happy to help you further.
Please like if you think effort deserves a like.
Thanks


Related Solutions

What are some examples of good debt vs. bad debt? Please, include an explanation.
What are some examples of good debt vs. bad debt? Please, include an explanation.
Questions 23–33: Heart Attack Survival, revisited Some people who are having a heart attack do not...
Questions 23–33: Heart Attack Survival, revisited Some people who are having a heart attack do not experience chest pain, although most do. A study of people admitted to emergency rooms with heart attacks compared the death rates of people who had chest pains with those of people who did not have chest pains (Brieger et al. 2004). Of the 1,763 people who had heart attacks without chest pain, 229 died, while of the 19,118 people who had heart attacks with...
(Birthday attack) A birthday attack is a type of cryptographic attack that exploits the mathematics behind...
(Birthday attack) A birthday attack is a type of cryptographic attack that exploits the mathematics behind the birthday problem in probability theory. It can be used to find collisions in a cryptographic hash function. Suppose that we have a hash function which, when supplied with a random input, returns one of 256 equally likely values. The attack generates n random inputs, supplies them into the hash function, and obtains n returned values (each is chosen from the 256 possible values...
3. The preferred response will include an explanation in your own words, and a good example....
3. The preferred response will include an explanation in your own words, and a good example. From the point of view of an issuing corporation, please describe the primary advantages and disadvantages of issuing preferred stock.
The preferred response will include an explanation in your own words, and a good example. Please...
The preferred response will include an explanation in your own words, and a good example. Please explain how a company computes their weighted average cost of capital, and why is it important? Compare the various components of the cost of capital, and include the tax advantages, if any, in the explanation.
4. The preferred response will include an explanation in your own words, and a good example....
4. The preferred response will include an explanation in your own words, and a good example. From the point of view of an issuing corporation, please describe the primary advantages and disadvantages of issuing preferred stock.
5 The preferred response will include an explanation in your own words, and a good example....
5 The preferred response will include an explanation in your own words, and a good example. Why is leasing sometimes referred to as “off-balance sheet financing? Discuss the four conditions that would require a lease to be classified as a capital lease.
Describe how the Heartbleed attack happens. What is the type of this attack? Where does the...
Describe how the Heartbleed attack happens. What is the type of this attack? Where does the vulnerability exist? Describe the vulnerability and how it is exploited? Describe the consequences of the attack?
The following are some calculation questions related to the experiment. Please include the questions and their...
The following are some calculation questions related to the experiment. Please include the questions and their answers in your report: a) A 0.05 L solution of 0.5 mol/L NaOH was titrated until neutralized into a 0.025 L sample of HCl. What was the concentration of the HCl? b) 50 L of 2.0 mol/L Hydrochloric acid is titrated with sodium hydroxide to form water and sodium chloride. How many moles of sodium hydroxide are consumed in this reaction? c) 100 L...
Write a brief report on KRACK Attack . The report should include how the attack works...
Write a brief report on KRACK Attack . The report should include how the attack works ? How the devices can be protected against this attack
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT