Assume a scenario where the hackers gained access to informationthrough malware on Point-of-Sale (POS) systems of more than millioncredit and debit card. The firewall had captured the first malwarecode and an alert was issued which was ignored. The hackers starteddownloading the collected data. The cyber criminals have hacked thesystem to gain credit and debit card information.
1. Explain in your own words what happened in the abovediscussed data breach. [5 Marks]
2. Identify and experience the type of attack experienced in theabove scenario [2 Marks]
3. The stolen credentials alone are not enough to access thecompany’s POS devices. What other means can the hackers acquire toallow them to navigate the company’s network and deploy themalware. [3 Marks]
4. What would have hackers done for privilege escalation? [2Marks]
5. The organization admitted that they ignored many alerts fromtheir network security devices because of alert overload. If youare the organization’s Chief Technical Officer (CTO), what wouldyou do to reduce the problem of alert overload? [3 Marks]
6. The security experts criticize the organization for failingto isolate sensitive sections of their networks from those moreeasily accessible to outsiders. As a CTO, please propose a feasiblesolution to segment and categorize your networks and resources. [5Marks]