Task 1
Task 1
NAMES
BCSM/2022/70077.HUSSIEN DOYO
Here's a detailed outline to help you craft your report on two major security threats from the last
decade. I'll cover the key points, including examples, vulnerabilities, impacts, motives, and methods. You
can expand on each section as needed to meet your word count requirement.
TITLE:
1. Type of Attack
Ransomware attacks involve malicious software that encrypts the victim's data, rendering it inaccessible.
The attacker then demands a ransom, typically in cryptocurrency, for the decryption key.
2. Vulnerability Exploited
Phishing Emails: Attackers send emails with malicious attachments or links that users unwittingly
click on.
Unpatched Software: Systems that have not been updated are more susceptible to exploitation.
Operational Disruption: Organizations can face significant downtime as they attempt to recover
data.
Financial Loss: Costs associated with the ransom itself, recovery efforts, and lost productivity can
be substantial.
Reputation Damage: Trust with customers and partners can be severely impacted.
The primary motive behind ransomware attacks is financial gain. Attackers aim to maximize their profit
by targeting organizations that are likely to pay the ransom to restore access to critical data.
Spear Phishing: Targeting specific individuals within an organization with tailored messages.
Exploitation of Remote Desktop Protocol (RDP): Gaining access to systems through weak or
stolen credentials.
1. Type of Attack
Data breaches involve unauthorized access to confidential data, leading to the exposure of sensitive
information, such as personal identification, credit card details, or corporate data.
2. Vulnerability Exploited
Weak Passwords: Many breaches occur due to easily guessable or reused passwords.
Insufficient Network Security: Inadequate firewalls and intrusion detection systems can allow
attackers to gain access.
Data Loss: Exposure of sensitive information can lead to identity theft and fraud.
Regulatory Consequences: Organizations may face fines and legal actions due to non-
compliance with data protection laws (e.g., GDPR).
Loss of Customer Trust: Breaches can damage customer relationships and brand reputation.
Both ransomware attacks and data breaches are significant threats that exploit common vulnerabilities
in modern organizations. Understanding these threats is crucial for implementing effective security
measures to protect sensitive information and maintain operational integrity.