ssume a scenario where the hackers gained access to information through malware on Point-of-Sale (POS) systems...

80.2K

Verified Solution

Question

Programming

ssume a scenario where the hackers gained access to informationthrough malware on Point-of-Sale (POS) systems of more than millioncredit and debit card. The firewall had captured the first malwarecode and an alert was issued which was ignored. The hackers starteddownloading the collected data. The cyber criminals have hacked thesystem to gain credit and debit card information. 1. Explain inyour own words what happened in the above discussed data breach. [5Marks] 2. Identify and experience the type of attack experienced inthe above scenario [2 Marks] 3. The stolen credentials alone arenot enough to access the company’s POS devices. What other meanscan the hackers acquire to allow them to navigate the company’snetwork and deploy the malware. [3 Marks] 4. What would havehackers done for privilege escalation? [2 Marks] 5. Theorganization admitted that they ignored many alerts from theirnetwork security devices because of alert overload. If you are theorganization’s Chief Technical Officer (CTO), what would you do toreduce the problem of alert overload? [3 Marks] 6. The securityexperts criticize the organization for failing to isolate sensitivesections of their networks from those more easily accessible tooutsiders. As a CTO, please propose a feasible solution to segmentand categorize your networks and resources. [5 Marks]

Answer & Explanation Solved by verified expert
4.4 Ratings (839 Votes)
1 The attack which took place in the given description is a point of sale malware attack which is specially designed for point of sale terminals and related systems with the goal of stealing of payment data and associatedated card data This type of attack is used by the cyber criminals who want to resell the data they captured from the attack on the POS The payment card data is encrypted end to end and is decrypted only at the the RAM memory of the device while the payment is processing The malware attack enters the system through a compromised or weakly secured point and it iterate over the RAM memory to find the payment card data Since in the RAM memory malware can find the an unencrypted data so through the internet connection all these data are sent to to hacker in an unencrypted form IT professionals also referred to the POS malware as a process scanner because it checks for the active processes on    See Answer
Get Answers to Unlimited Questions

Join us to gain access to millions of questions and expert answers. Enjoy exclusive benefits tailored just for you!

Membership Benefits:
  • Unlimited Question Access with detailed Answers
  • Zin AI - 3 Million Words
  • 10 Dall-E 3 Images
  • 20 Plot Generations
  • Conversation with Dialogue Memory
  • No Ads, Ever!
  • Access to Our Best AI Platform: Flex AI - Your personal assistant for all your inquiries!
Become a Member

Other questions asked by students