0% found this document useful (0 votes)
14 views

Lab 1.2

Uploaded by

mira.sach22
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
14 views

Lab 1.2

Uploaded by

mira.sach22
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

SMB DISSANYAKE

S8119954

Lab - Cybersecurity Case Studies


Objectives
Research and analyze cyber security incidents

Background / Scenario
Governments, businesses, and individual users are increasingly the targets of cyberattacks and experts
predict that these attacks are likely to increase in the future. Cybersecurity education is a top international
priority as high-profile cyber-security related incidents raise the fear that attacks could threaten the global
economy. The Center for Strategic and International Studies estimates that the cost of cybercrime to the
global economy is more than $400 billion annually and in the United State alone as many as 3000 companies
had their systems compromised in 2013. In this lab you will study four high profile cyberattacks and be
prepared to discuss the who, what, why and how of each attack.

Required Resources
• PC or mobile device with Internet access

Step 1: Conduct search of high profile cyberattacks.


a. Using your favorite search engine conduct a search for each of the cyberattacks listed below. Your
search will likely turn up multiple results ranging from news articles to technical articles.
Home Depot Security Breach
Target Credit Card Breach
The Stuxnet Virus
Sony Pictures Entertainment Hack
Note: You can use the web browser in virtual machine installed in a previous lab to research the hack. By
using the virtual machine, you may prevent malware from being installed on your computer.
b. Read the articles found from your search in step 1a and be prepared to discuss and share your research
on the who, what, when, where, and why of each attack.

Step 2: Write an analysis of a cyberattack.


Select one of the high-profile cyberattacks from step 1a and write an analysis of the attack that includes
Analysis of a Cyberattack: Home Depot Security Breach (2014)
a. Who were the victims of the attacks?
• Home Depot customers whose payment card information was processed during the breach
(approximately 56 million cardholders).
• The company itself suffered significant financial and reputational damage.
• Financial institutions that bore costs related to fraudulent charges and reissuing cards.

b. What technologies and tools were used in the attack?


• Technologies/Tools:

© Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 1 of 2 www.netacad.com
Lab – Cybersecurity Case Studies

o Malware (BlackPOS): Installed on Home Depot's point-of-sale (POS) systems to scrape payment
card data.
o Stolen credentials: The attackers used compromised credentials from a third-party vendor to
gain initial access to the network.
o C&C (Command and Control) infrastructure: Used to exfiltrate the stolen data to external
servers.

c. When did the attack happen within the network?


• The attackers gained unauthorized access in April 2014, and the breach remained undetected until
September 2014.
• POS malware operated during this period, continuously stealing payment data.

d. What systems were targeted?


• Home Depot’s Point-of-Sale (POS) systems: The primary target for collecting credit and debit card
information.
• Internal corporate network: Compromised to deploy malware across the retail environment.

e. What was the motivation of the attackers in this case? What did they hope to achieve?
• Primary Motivation: Financial gain.
• The attackers sought to steal payment card data to sell on the black market or use for fraudulent
purchases.

f. What was the outcome of the attack?


• Stolen Data: Over 56 million credit and debit card details and 53 million email addresses.
• Financial Impact: Home Depot incurred costs of approximately $179 million related to the breach,
including legal fees, settlements, and credit monitoring services for customers.
• Reputation Damage: Loss of consumer trust and increased scrutiny of Home Depot’s cybersecurity
practices.

© Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 2 of 2 www.netacad.com

You might also like