Cybersecurity Record

Download as pdf or txt
Download as pdf or txt
You are on page 1of 21

1.

Prog sol:

The roles and responsibilities of a system administrator may vary depending


on the organization and the technology infrastructure. However, some
common responsibilities of a system administrator include:

1. Managing and maintaining the organization's network and server


infrastructure.
2. Installing and configuring software applications, updates, and security patches.
3. Managing user accounts, access permissions, and passwords.
4. Monitoring system performance and responding to system alerts and errors.
5. Creating and implementing backup and disaster recovery plans.
6. Ensuring compliance with security policies and regulations.
7. Providing technical support and training to end-users.
8. Conducting security audits and vulnerability assessments.

Steps for creating a user account, setting permissions, and protecting your
files with a password:

1. Open the Control Panel on your computer.


2. Click on "User Accounts."
3. Click on "Manage another account."
4. Click on "Add a new user in PC settings."
5. Choose whether you want to create a Microsoft account or a local account.
6. Fill in the required information, including the username and password.
7. Choose the account type (administrator or standard).
8. Click "Create Account."
9. Open the folder containing the file you want to protect.
10. Right-click on the file and select "Properties."
11. Click on the "Security" tab.
12. Click "Edit" to change permissions.
13. Choose the user you want to give permission to.
14. Check the "Allow" box next to the actions you want to allow the user to
perform.
15. Click "OK" to save changes.
16. To protect the file with a password, you can use a third-party encryption tool
or built-in encryption features of the operating system.

It's important to note that protecting files with a password alone may not be
sufficient. It's also essential to have proper security measures in place, such as
firewalls, antivirus software, and regular backups, to ensure the safety and
security of your data.

2. Prog solution:
Disk partitioning is the process of dividing a physical hard drive into multiple logical drives or
partitions. Here are the steps for disk partitioning and performing operations like shrinking,
extending, deleting, and formatting:

1. Open the Disk Management tool by pressing the Windows key + X and selecting "Disk
Management" from the menu.
2. Right-click on the unallocated space or the partition you want to modify and select "New Simple
Volume," "Shrink Volume," "Extend Volume," "Delete Volume," or "Format."
3. To create a new partition, select "New Simple Volume," and the New Simple Volume Wizard
will appear. Follow the on-screen instructions to specify the size, drive letter, file system format,
and volume label for the new partition.
4. To shrink a partition, right-click on the partition you want to shrink and select "Shrink Volume."
Enter the amount of space you want to shrink the partition by in MB (megabytes), and click
"Shrink."
5. To extend a partition, right-click on the partition you want to extend and select "Extend
Volume." Follow the on-screen instructions to specify the amount of space you want to add to
the partition.
6. To delete a partition, right-click on the partition you want to delete and select "Delete Volume."
Confirm the deletion, and the partition will be removed, and the space will become unallocated.
7. To format a partition, right-click on the partition you want to format and select "Format." Select
the file system format you want to use (NTFS, FAT32, etc.), and enter a volume label. Click
"OK" to format the partition.

It's important to note that when you delete a partition, all data on that partition will be lost, so
make sure you have a backup before deleting any partitions. Additionally, when extending a
partition, the unallocated space you want to add must be adjacent to the partition you want to
extend. If there are partitions between the partition you want to extend and the unallocated space,
you'll need to move or delete those partitions first.
3. Prog solution:

Case Study: MediaMarkt Ransomware Attack

MediaMarkt is a popular electronics retailer with over 1000 stores across


Europe. In December 2020, the company fell victim to a ransomware attack
that affected its entire IT infrastructure. The attack resulted in a significant
disruption to the company's operations, including the temporary closure of
some stores.

The attack was discovered on December 9, 2020, when MediaMarkt's IT team


detected unusual activity on some of the company's servers. Upon
investigation, they found that a ransomware attack had encrypted the
company's data and demanded a ransom payment in exchange for the
decryption key.

MediaMarkt immediately took steps to contain the attack and protect its
customers' data. The company's IT team disconnected affected systems from
the network and shut down some of the servers to prevent the malware from
spreading further. The company also contacted law enforcement agencies and
hired cybersecurity experts to investigate the attack.

Despite these measures, the ransomware attack caused significant damage to


MediaMarkt's IT infrastructure. The company was forced to shut down some of
its stores temporarily, and its online operations were also affected. The
company also faced a difficult decision regarding the ransom payment
demanded by the attackers. Ultimately, MediaMarkt decided not to pay the
ransom and instead relied on its backup systems to restore its data.

The aftermath of the attack was also challenging for MediaMarkt. The
company had to invest significant resources in rebuilding its IT infrastructure
and improving its cybersecurity measures to prevent future attacks.
MediaMarkt also had to deal with the reputational damage caused by the
attack, as customers and investors became concerned about the company's
ability to protect their data.
Lessons Learned

The MediaMarkt ransomware attack highlights the importance of having


robust cybersecurity measures in place to prevent and respond to such
attacks. Some key takeaways from this incident include:

1. Regularly backup your data: MediaMarkt was able to recover from the attack
because it had backup systems in place. Having a regular backup system is
critical to ensure that you can restore your data in case of an attack.
2. Invest in cybersecurity measures: Companies must invest in cybersecurity
measures such as firewalls, antivirus software, and intrusion detection systems
to prevent attacks.
3. Train your employees: Cybersecurity is everyone's responsibility. Companies
must train their employees to identify potential threats and take appropriate
action to prevent attacks.
4. Have an incident response plan: Having an incident response plan in place can
help companies respond quickly and effectively to a cybersecurity attack. An
incident response plan should outline the steps to take in case of an attack,
including who to contact and how to contain the attack.

Conclusion

The MediaMarkt ransomware attack is just one example of the growing threat
of cyberattacks to companies of all sizes. As the threat of ransomware attacks
continues to grow, it's critical that companies take proactive steps to protect
their data and IT infrastructure. By investing in cybersecurity measures,
training employees, and having an incident response plan in place, companies
can reduce the risk of a ransomware attack and minimize the damage if one
does occur.
4. Prog solution:
1. Identify the software: Go to the website or repository of the open source
software that you want to install. Search for the software and check if it is
compatible with your operating system.
2. Download the software: Once you have identified the software, click on the
download button to download the latest version of the software. Make sure to
download the appropriate version for your operating system.
3. Extract the downloaded file: Once the software is downloaded, extract the
downloaded file using any suitable extraction tool. The extracted files may be
in a compressed format like .zip or .tar.
4. Install the software: Once extracted, follow the instructions provided in the
installation guide to install the software. The installation process may vary
depending on the software being installed.
5. Complete the installation: Once the installation is completed, configure the
software settings as required. The software is now ready to use.

Installation of Software from Paid Subscription Mode:

1. Choose the software: Go to the website or vendor of the software that you
want to install and purchase the subscription for the same. Check if the
software is compatible with your operating system.
2. Download the software: Once the subscription is purchased, log in to your
account on the vendor's website and download the software. Ensure to
download the appropriate version for your operating system.
3. Launch the installation wizard: Navigate to the downloaded file and double-
click on the setup file to launch the installation wizard.
4. Agree to the terms and conditions: Read the terms and conditions provided in
the installation guide and agree to the same.
5. Enter the license key: Enter the license key provided by the vendor during the
purchase process. This key may be sent via email or available in your account
dashboard.
6. Choose the installation location: Choose the location where you want to install
the software. You may also choose to install the software in the default
location.
7. Complete the installation: Once all the above steps are completed, the
installation process will begin. Follow the on-screen instructions to complete
the installation.
8. Configure the software settings: Once the installation is completed, configure
the software settings as required. The software is now ready to use.

Note: The installation process may vary slightly depending on the software
vendor and the type of software being installed. It is always recommended to
read the installation guide and follow the instructions carefully to avoid any
errors or issues.

Program 5 solution:

Steps to Make Google Chrome the Default Browser:

1. Launch Google Chrome: Open the Google Chrome browser on your computer.
2. Access Chrome Settings: Click on the three-dot menu icon located at the top-
right corner of the browser window. Select "Settings" from the drop-down
menu.
3. Scroll down and click on "Advanced": This will expand the settings menu.
4. Find "Default browser": Under the "System" section, click on the "Default
browser" option.
5. Click on "Make default": Click on the button labeled "Make default" to make
Google Chrome your default browser.
6. Restart your computer: After setting Google Chrome as the default browser,
you may need to restart your computer for the changes to take effect.
Steps to Add ActiveX Controls:

1. Open Google Chrome: Launch the Google Chrome browser on your computer.
2. Access Chrome Extensions: Click on the three-dot menu icon located at the
top-right corner of the browser window. Select "More tools" and then select
"Extensions" from the drop-down menu.
3. Search for ActiveX Control: In the Chrome Web Store search box, type
"ActiveX Control" and press enter.
4. Choose an ActiveX Control: From the search results, select an ActiveX Control
that suits your needs and click on "Add to Chrome" to install it.
5. Enable the ActiveX Control: Once the ActiveX Control is installed, navigate to
the website where you want to use the ActiveX Control. Chrome will prompt
you to enable the ActiveX Control. Click "Enable" to allow the control to run.

Steps to Add Add-ons:

1. Open Google Chrome: Launch the Google Chrome browser on your computer.
2. Access Chrome Web Store: Click on the three-dot menu icon located at the
top-right corner of the browser window. Select "More tools" and then select
"Extensions" from the drop-down menu.
3. Search for Add-ons: In the Chrome Web Store search box, type the name of
the Add-on that you want to install and press enter.
4. Choose an Add-on: From the search results, select an Add-on that suits your
needs and click on "Add to Chrome" to install it.
5. Enable the Add-on: Once the Add-on is installed, navigate to the website
where you want to use the Add-on. Chrome will prompt you to enable the
Add-on. Click "Enable" to allow the Add-on to run.

Note: The process to add ActiveX controls and Add-ons may vary depending
on the software and website requirements. It is always recommended to check
the installation instructions provided by the software vendor or website.
Program 6 :

To establish a peer-to-peer network connection using two systems in a LAN,


you can follow these steps:

1. Connect both computers: Connect both computers to the same LAN using
Ethernet cables or connect both systems to the same Wi-Fi network.
2. Set IP addresses: Assign IP addresses to both computers on the same subnet.
To do this, open the Control Panel on both computers and navigate to
Network and Sharing Center. Select Change adapter settings, right-click on
the Local Area Connection, and select Properties. Select Internet Protocol
Version 4 (TCP/IPv4), click on Properties, and assign IP addresses on the same
subnet. For example, Computer 1 can have an IP address of 192.168.0.1 and
Computer 2 can have an IP address of 192.168.0.2.
3. Enable File and Printer Sharing: Open Control Panel on both computers and
navigate to Network and Sharing Center. Select Change advanced sharing
settings and enable File and Printer Sharing.
4. Create a shared folder: On one of the computers, create a folder that you want
to share with the other computer. Right-click on the folder, select Properties,
navigate to the Sharing tab, and click on Advanced Sharing. Enable the "Share
this folder" option and click on Permissions to set the permission levels for
other users on the network.
5. Connect to the shared folder: On the other computer, open File Explorer, and
in the address bar, type \computername\sharedfoldername, where
computername is the name of the computer with the shared folder, and
sharedfoldername is the name of the shared folder. For example, if Computer
1 has a shared folder named "SharedFiles," the address will be
\192.168.0.1\SharedFiles.
6. Enter the username and password: If prompted, enter the username and
password of the user account on the computer that has the shared folder.
7. Access shared files: After entering the correct credentials, you should be able
to access the shared files on the other computer.

Note: The steps may vary slightly depending on the operating system and the
network configuration.
Program 7 :
WiFi is a technology that uses radio waves to provide wireless high-speed
internet and network connections between devices such as computers,
smartphones, tablets, and other wireless-enabled devices.

To configure WiFi on a Windows operating system, you can follow these steps:

1. Open the Network & Internet Settings: Click on the network icon in the system
tray (bottom right corner of the taskbar) or go to the Settings app and click on
Network & Internet.
2. Select the WiFi network: In the Network & Internet settings, select WiFi from
the left pane, and click on the "Show available networks" option to see the list
of available wireless networks.
3. Connect to a WiFi network: Select the WiFi network that you want to connect
to from the list of available networks and click on the "Connect" button.
4. Enter the network password: If the network is secured with a password, you
will be prompted to enter the password. Type in the password and click on
"Connect."
5. Configure network settings: Once connected, you can configure additional
network settings by clicking on the "Properties" button next to the network
name. Here you can change the network name, turn on or off network
discovery, configure network sharing, and more.

Note: If you are connecting to a hidden network, you will need to click on the
"Manually connect to a wireless network" option and enter the network name
(SSID), security type, and security key (password) manually.

These steps are generally applicable to most versions of Windows, although


the specific steps may vary slightly depending on the version of Windows you
are using.
Program 8 :
Here are the steps to install and configure network components like switches,
hubs, and modems:

1. Choose the right equipment: Determine the type and number of devices you
need based on your network requirements. A switch is used to connect
multiple devices within a LAN, while a hub is used to connect devices in a
small network. A modem is used to connect to the internet.
2. Install the devices: Follow the manufacturer's instructions to install the devices
physically, such as mounting switches or hubs on a rack or desk, and
connecting power and network cables.
3. Configure the devices: Connect to the device's management interface, usually
through a web browser or specialized software provided by the manufacturer.
Configure the network settings, such as IP address, subnet mask, gateway, and
DNS server settings.
4. Test the network: Verify that the devices can communicate with each other
and access the internet, if necessary. Troubleshoot any connectivity issues by
checking cables and configuration settings.

Connecting to Dial-Up Networking:

1. Configure modem settings: Connect the modem to the computer using a


serial or USB cable, and install any drivers required. Configure the modem
settings, such as the phone number, username, and password for your internet
service provider (ISP).
2. Create a new connection: Open the Control Panel and select Network and
Sharing Center. Click on Set up a new connection or network, and choose
Connect to the Internet. Select Dial-up, and enter the ISP phone number,
username, and password.
3. Test the connection: Click on the Connect button to establish the dial-up
connection. Verify that the connection is successful by trying to access a
website or sending an email.
Note: Dial-up networking is an older technology and is not commonly used
today. Most users now connect to the internet using broadband technologies
such as DSL, cable, or fiber.

Program 9 :
Firewalls are a network security technology that helps to control access to a
network by monitoring and filtering traffic that flows through it. Here are
some common features of firewalls:

1. Packet filtering: Firewalls can block traffic based on predefined rules that filter
incoming and outgoing traffic based on IP address, port number, protocol,
and other criteria.
2. Application-level filtering: Firewalls can also monitor and filter traffic based on
the type of application, such as blocking or allowing access to specific
websites or email services.
3. Network Address Translation (NAT): Firewalls can hide the internal network IP
addresses and translate them to external IP addresses, making it difficult for
attackers to identify and target specific hosts.
4. VPN support: Firewalls can provide secure remote access to a network using
virtual private network (VPN) technologies.

Steps to set Firewall Security in Windows:

1. Open the Windows Security app: Click on the Start button, type "Windows
Security" in the search bar, and select the Windows Security app from the
search results.
2. Choose the Firewall & network protection option: Click on the Firewall &
network protection option in the Windows Security app.
3. Check the firewall status: Check if the firewall is turned on or off. If the firewall
is turned off, click on the "Turn on" button to enable it.
4. Configure firewall settings: Click on the "Allow an app through firewall" option
to configure the firewall settings. Select the app you want to allow or block
from the list, or add a new app by clicking on the "Change settings" button.
5. Customize firewall rules: Click on the "Advanced settings" option to customize
the firewall rules. Here, you can create new rules for inbound and outbound
traffic, set port and protocol filtering, and configure network profiles for public
and private networks.
6. Test the firewall: Test the firewall settings by accessing various applications
and services on your network. Check if the firewall is blocking any legitimate
traffic and adjust the rules accordingly.

By following these steps, you can set up and configure firewall security in
Windows to help protect your network from unauthorized access and
potential threats.

Program 10 :
Here are the steps for installing system software, application software, and
antivirus:

1. System software installation:


 Determine the system software needed: Decide what system software needs
to be installed based on the system requirements of the computer or server.
 Acquire the installation media: Download the system software from the
manufacturer's website or obtain the installation media such as CDs, DVDs, or
USB drives.
 Insert the installation media: Insert the installation media into the computer
and wait for it to be recognized.
 Start the installation process: Follow the prompts to start the installation
process and choose the appropriate installation options.
 Follow the prompts: Follow the prompts to complete the installation process,
including accepting license agreements, selecting installation directories, and
configuring settings.
 Restart the computer: Once the installation is complete, restart the computer
to apply any changes.
2. Application software installation:
 Determine the application software needed: Decide what application software
needs to be installed based on the user requirements.
 Acquire the installation media: Download the application software from the
manufacturer's website or obtain the installation media such as CDs, DVDs, or
USB drives.
 Insert the installation media: Insert the installation media into the computer
and wait for it to be recognized.
 Start the installation process: Follow the prompts to start the installation
process and choose the appropriate installation options.
 Follow the prompts: Follow the prompts to complete the installation process,
including accepting license agreements, selecting installation directories, and
configuring settings.
 Restart the computer: Once the installation is complete, restart the computer
to apply any changes.
3. Antivirus installation:
 Determine the antivirus software needed: Decide what antivirus software
needs to be installed based on the user requirements and the level of
protection needed.
 Acquire the installation media: Download the antivirus software from the
manufacturer's website or obtain the installation media such as CDs, DVDs, or
USB drives.
 Insert the installation media: Insert the installation media into the computer
and wait for it to be recognized.
 Start the installation process: Follow the prompts to start the installation
process and choose the appropriate installation options.
 Follow the prompts: Follow the prompts to complete the installation process,
including accepting license agreements, selecting installation directories, and
configuring settings.
 Update virus definitions: After installation, update the antivirus software with
the latest virus definitions to ensure the maximum protection against new
threats.
 Configure antivirus settings: Configure the antivirus settings, such as scan
schedules, real-time protection, and quarantine options, according to the user
requirements.

By following these steps, you can install system software, application software,
and antivirus software on a computer or server, and help ensure that the
system is secure, up-to-date, and running smoothly.
Program 11:
Spooling, short for Simultaneous Peripheral Operations Online, is a feature
used in printing to allow multiple print jobs to be stored in a buffer, or spool,
until the printer is ready to print them. Spooling printers helps to reduce the
wait time for print jobs and to increase the efficiency of printing.

Here are the steps for spooling printer:

1. Open the printer settings: Click on the "Start" button and select "Devices and
Printers" from the menu. Right-click on the printer you want to use and select
"Printer Properties" from the context menu.
2. Enable spooling: In the "Printer Properties" dialog box, select the "Advanced"
tab, and then click on the "Print Processor" button. In the "Print Processor"
dialog box, select the "WinPrint" processor and select the "RAW" data type.
Under the "Default Data Type" section, select "RAW" and click on "OK".
3. Adjust spooling settings: In the "Advanced" tab of the "Printer Properties"
dialog box, click on the "Spool print documents" radio button. Under the
"Spool Settings" section, select "Start printing after last page is spooled"
option.
4. Configure spooling settings: Click on the "Print Spooled Documents First"
check box to prioritize the print jobs in the spooler. You can also set the
priority of the print jobs by clicking on the "Priority" option and selecting the
desired priority level.
5. Save the settings: Click on the "Apply" button to save the settings, and then
click on the "OK" button to close the dialog box.

By following these steps, you can enable spooling on a printer, which can help
to improve printing performance and reduce wait times for print jobs.
Program 12:
ip_address = input("Enter an IP address: ")

# Split the IP address into octets


octets = ip_address.split(".")

# Convert each octet to an integer


octets = [int(octet) for octet in octets]

# Check the category of the IP address


if octets[0] >= 1 and octets[0] <= 127:
print("The IP address is a Class A address")
elif octets[0] >= 128 and octets[0] <= 191:
print("The IP address is a Class B address")
elif octets[0] >= 192 and octets[0] <= 223:
print("The IP address is a Class C address")
elif octets[0] >= 224 and octets[0] <= 239:
print("The IP address is a Class D address")
elif octets[0] >= 240 and octets[0] <= 255:
print("The IP address is a Class E address")
else:
print("The IP address is not a valid IP address")

The program prompts the user to enter an IP address, then splits the IP
address into its octets and converts each octet to an integer. It then checks the
value of the first octet to determine the category of the IP address and prints a
message indicating the category. If the IP address is not a valid IP address, the
program prints a message indicating that the IP address is not valid.
Program 13:
import re

def password_strength(password):
score = 0

# Check the length of the password


if len(password) < 8:
return "Password is too weak"
elif len(password) >= 8 and len(password) <= 12:
score += 1
elif len(password) > 12:
score += 2

# Check if the password contains uppercase and lowercase letters


if re.search(r"[a-z]", password) and re.search(r"[A-Z]", password):
score += 2

# Check if the password contains numbers


if re.search(r"\d", password):
score += 1

# Check if the password contains symbols


if re.search(r"[ !#$%&'()*+,-./:;<=>?@[\]^_`{|}~]", password):
score += 2

# Determine the strength of the password based on the score


if score <= 2:
return "Password is weak"
elif score <= 4:
return "Password is medium"
else:
return "Password is strong"

# Prompt the user to enter a password


password = input("Enter a password: ")

# Check the strength of the password and print the result


print(password_strength(password))
The program defines a function password_strength() that takes a
password as an argument and calculates its strength based on the
following criteria:

 If the password length is less than 8 characters, it is too weak.


 If the password length is between 8 and 12 characters, it is medium.
 If the password length is greater than 12 characters, it is strong.
 If the password contains both uppercase and lowercase letters, it gets
2 points.
 If the password contains at least one number, it gets 1 point.
 If the password contains at least one symbol, it gets 2 points.

The program prompts the user to enter a password, calls the


password_strength()

Program 14:
Transferring files between wireless communication using Bluetooth:

1. Turn on Bluetooth on both devices that you want to transfer files between.
2. On the sending device, locate the file(s) you want to transfer and select them.
3. Choose the option to share the file(s) via Bluetooth.
4. The sending device will start scanning for available Bluetooth devices, and
should display a list of nearby devices.
5. Choose the device that you want to transfer the files to.
6. On the receiving device, you should see a prompt asking if you want to accept
the incoming file transfer. Accept the transfer.
7. The files should start transferring between the two devices.

Transferring files using FTP:

1. Set up an FTP server on the computer that has the files you want to transfer.
There are several free and paid FTP server software options available for
download.
2. Connect to the FTP server from the device you want to transfer files to. You
can use a dedicated FTP client software, or use the built-in file explorer on
your device if it supports FTP.
3. Log in to the FTP server using the server's IP address and your login
credentials.
4. Navigate to the directory where the files you want to transfer are located.
5. Select the files you want to transfer and choose the option to download them
to the device you're using.
6. The files should start downloading to the device.

Note that for both methods, the devices need to be within range of each other
and be paired or connected to the same network.

Program 15 :
What is Malware? Write the steps to remove the malware from your PC.

Malware is a type of software designed to harm or exploit a computer system


or network. It can come in many forms, including viruses, trojans, spyware,
adware, and ransomware. If you suspect your PC has been infected with
malware, it's important to take action to remove it as soon as possible to
prevent further damage or data loss.

Here are the steps to remove malware from your PC:

1. Identify the malware: Use a reputable anti-malware software to scan your


computer and identify any malicious files or programs that are causing
problems.
2. Disconnect from the internet: If you suspect that your computer is infected
with malware, disconnect from the internet to prevent further damage or data
loss.
3. Boot into Safe Mode: Restart your computer and boot into Safe Mode, which
will allow you to remove the malware without interference from the malware
itself. To enter Safe Mode, press the F8 key repeatedly while the computer is
booting up.
4. Remove the malware: Use the anti-malware software to remove any detected
malware from your system. Follow the instructions provided by the software
and be sure to remove all instances of the malware.
5. Update your anti-malware software: Ensure that your anti-malware software is
up-to-date with the latest virus definitions and patches. This will help to
prevent future infections.
6. Scan your computer again: Once you've removed the malware and updated
your anti-malware software, scan your computer again to ensure that all traces
of the malware have been removed.
7. Reconnect to the internet: Once you're confident that your computer is free
from malware, reconnect to the internet and monitor your computer for any
signs of suspicious activity or further infections.

It's important to remember that prevention is the best defense against


malware. Be sure to keep your anti-malware software up-to-date and practice
safe browsing habits to minimize the risk of infection.

Program 16 :

Prepare a case study of cyber attack through Facebook Account

Case Study: Cyber Attack Through Facebook Account

In 2018, Facebook suffered a major cyber attack that affected millions of users.
The attackers exploited a vulnerability in Facebook's "View As" feature, which
allows users to see how their profile appears to others. This allowed the
attackers to steal access tokens, which are digital keys that allow users to stay
logged in to their Facebook account without having to enter their password
every time.

The attackers used these stolen access tokens to take control of users'
Facebook accounts and potentially access other websites and services that
users had linked to their Facebook account. The attack affected approximately
50 million Facebook users and raised serious concerns about the security and
privacy of personal data on social media platforms.

The attack was first discovered by Facebook's security team on September 16,
2018. Facebook immediately took steps to fix the vulnerability and notified law
enforcement authorities. Facebook also reset access tokens for the affected
users and logged them out of their accounts as a precautionary measure.

Facebook faced widespread criticism for the attack, particularly for its handling
of user data and privacy concerns. The company's stock price also took a hit in
the aftermath of the attack.

Lessons Learned:

The cyber attack on Facebook highlights the importance of strong security


measures and proactive risk management. It's crucial for companies to
regularly assess their systems and vulnerabilities and take steps to protect
against potential attacks.

Users should also be vigilant about their online activity and take steps to
protect their personal data. This includes using strong passwords, enabling
two-factor authentication, and being cautious about sharing personal
information online.

In addition, the attack underscores the importance of transparency and


communication in the event of a data breach. Companies should be upfront
and transparent with users about any potential risks and take swift action to
minimize the impact of any breach.

Overall, the Facebook cyber attack serves as a cautionary tale about the
ongoing risks and challenges of online security and the need for continuous
vigilance and investment in security measures.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy