Beruflich Dokumente
Kultur Dokumente
IM1/11/AP
1/21/2019
This web page discusses the five phases of hacking: reconnaissance, scanning, gaining
access, maintaining access, and clearing tracks. Reconnaissance is the first step, where the
hacker is trying to collect as much information that they can about their target by doing research
or using. The second step is scanning, which is using different tools to scan the data obtained in
order to find any information that can help them infiltrate the system. After obtaining all the
necessary information, the hacker moves on to step three, where they design a plan of the
network and decide how to gain access. Once they gain access, they would have to be able to
maintain access and remain unidentified by the network’s security system. The final step is to
clear their tracks, so that no one can reach the, this is done prior to the attack and after the attack.
This source is helpful in that it provides information about a common and simplified
version of how hackers begin their process of infiltrating a network. As well, information about
the phases will help draw connections to the characteristic patterns found in many malicious
users.
This web article is discusses the five phases of hacking and the different types of
elements in each phase. Such as in step one, reconnaissance, there are two types of
foot-printing/information gathering, such as active (directly interacting with the target to gain
information) and passive (trying to collect information without direct interactions with the
target). In scanning, step two, there are three types of scanning, post scanning (scanning the
target for information), vulnerability scanning (scanning the target for any weaknesses that can
be exploited), and network mapping (finding any networks, routers, and firewalls). The hacker
might use a variety of tools and methods in order to both gain access and maintain access by
using Trojans, Rootkits, or other malicious files just until they finish their task. While in clearing
their tracks, the hacker would have to modify, corrupt, or even delete any logs, applications, and
files that were created or used during the process.
Though this web article is similar to the article from Geeks for Geeks, where both discuss
the five phases of hacking, this article offers more information about the different types of
approaches that hackers might take for each phase of hacking. But both are able to explain the
basic information that is easily understandable by anyone, especially those who might not
necessarily understand or have a deep knowledge in hacking.
Isaac, Mike, and Sheera Frenkel. "Facebook Security Breach Exposes Accounts of 50
Million Users." NYTimes, 28 Sept. 2018,
www.nytimes.com/2018/09/28/technology/facebook-hack-data-breach.html.
Accessed 15 Jan. 2020.
This news article is about the Facebook data breaches that had occurred in 2018 and it
discusses the background information of what the data breaches were about. Back in September
2018, Facebook and its team had announced that 50 million users were affected as there was an
attack on its computer networks, which had exposed the personal information of about 50 million
users. As well, it shows how Facebook is struggling to maintain their reputation in the public
eye, since it was buffeted by a scandal, where a British analytics firm obtained access to the
private information of up to 87 million users, resulting in elections being affected and even some
deaths in other countries. This article also incorporates Mark Zuckerburg’s and his team’s
comments on the issue, assuring the public that they are “taking it really seriously.”
This is a reliable source, but it does not offer much information about the specific details
on the identity of the hacker(s) and how they were able to attack Facebook’s computer system
networks. Though, it does nicely provide basic background information about the situation at the
time and also including insight and comments from Mark Zuckerburg and his team.
Liu, Ruinan, et al. "Clustering User Accesses to Detect Anomalous Behavior." Clustering
User Accesses to Detect Anomalous Behavior, 2019, pp. 1-9.
Nakashima, Ellen, and Ashkan Soltani. "The Ethics of Hacking 101." Washington Post,
08 Oct 2014. Sirsissuesresearcher,
https://explore.proquest.com/sirsissuesresearcher/document/2262370097?accountid=
3292.
This news-article discusses potential vulnerabilities that pose a threat to many computer
systems that even the military and government officials rely on. “Hackers” who are able to
breach into a system actually provide an advantage to cyber defense professionals. Cyber-offense
is the teaching and practice of ethical hacking. It starts off with seeking vulnerabilities, such as
bugs and viruses, and reporting them to the software vendor or the U.S. government. Then the
article transitions to discussing more about the role of offensive cyber skills in colleges and
universities and the controversy that surrounds it, because it is essentially teaching students a set
of dangerous skills that can be used to harm someone, intentionally or not. For example, Stuxnet
was the first usage of a cyberweapon, which was used to harm Iranian centrifuges that would
later be bombed. But not all exploits and vulnerabilities are illegal, the ones that are used with
the intent of hacking are considered illegal, otherwise, they would have safe uses, such as
unlocking an iPhone to switch providers.
This news article is helpful in ways of providing some leads to using cyber-offense skills
to defend a computer system. Also, the article helps answer a question about how simulations are
designed and how cognitive modeling might factor in vulnerabilities into a simulated penetration
of a computer system.
"Number of Social Network Users Worldwide from 2010 to 2021." Statista, J. Clemnt,
14 Aug. 2019,
www.statista.com/statistics/278414/number-of-worldwide-social-network-users/.
Accessed 14 Jan. 2020. Chart.
This source depicts a chart of the number of social network users worldwide from 2010
to 2021 (in billions), where there were 2.82 billion social network users worldwide in 2019.
Whereas, compared to the estimated number of 2.65 billion people using social media
worldwide, the projection will be about 3.1 billion by 2021. This means that by 2021, more and
more people have access to the internet and the projection will mean that the global growth of
users will be driven by the increasing use of mobile devices.
The chart and captions offer statistics for the background/introduction paragraph for the
research paper to rely on, which would suggest the evidence of advancing technology and even
computer networks. Thus, tying into the topic of increasing hackers, which would result in more
and more people being affected annually, creating a sense of urgency about the importance of
this research topic.
This source is a description from the application’s website, which describes what a
vulnerability scanner is and its functions. A vulnerability scanner is an automated tool that has
the ability to scan web applications in order to look for vulnerabilities, weaknesses, that might be
exploited. Some vulnerabilities can include: cross-site scripting, SQL injection, command
injection, path traversal, and insecure server configurations, and these are the most commonly
seen vulnerabilities in web applications. The source then goes onto listing out various examples
of different vulnerability scanners that are offered, along with information about the owner,
license, and platforms that the vulnerability scanner is compatible with.
The source does not give that much detailed information about how a vulnerability
scanner can function. It just gives some basic information about what a vulnerability scanner is
and some options that were listed below.
This chapter of a manual or book/journal is about access tokens, which are the things that
applications use to make API requests on behalf of the user. The access tokens are basically the
authorization of a specific application to access different parts of a user’s information data. The
chapter describes more about the importance of access tokens and how it is crucial for the web
application to make sure that these access tokens to remain kept in confidential. Otherwise, there
would be an increase in the risk of the user being affected if something happens to their access
token, such as a data breach or hack that might occur.
The information about access tokens can be tied into the Facebook data breaches, where
the hackers were able to obtain these access tokens. This would also show the consequence of
not being able to successfully protect access tokens and it suggests that the probability of access
tokens being compromised is very likely and it can happen to any web application at any time.
Perez, Sarah, and Zack Whittaker. "Everything You Need to Know about Facebook's
Data Breach Affecting 50M Users." Techcrunch, 28 Sept. 2018,
techcrunch.com/2018/09/28/everything-you-need-to-know-about-facebooks-data-
breach-affecting-50m-users/. Accessed 15 Jan. 2020.
This web article offers more in-depth information about the Facebook data breaches that
had occurred in 2018. About 50 million users’ data were confirmed to be affected by the actions
of these unknown hackers. These hackers were able to infiltrate Facebook with three software
bugs that had led to the data exposure. Back in 2017, Facebook had accidentally introduced
vulnerabilities in its video uploader and “View As” function, which one had been left undetected
until the attack took place. But Facebook had announced that the vulnerability was fixed and the
team was starting to reset access tokens in order to better protect the security of their accounts,
since there were 40 more million users at risk of data exposure.
This article is formatted in a question and answer format, making it easier to read and
identify the important parts that pertained to the research topic. Also with this format, it was
easier to break up the article into different sections. However, there was little to none
information about how the author was able to obtain this information and it could be viewed as a
blogger giving their analysis of the situation in a lengthy blog post.
Raffer, Dan. "2019 Data Breaches: 4 Billion Records Breached so Far." Norton,
us.norton.com/internetsecurity-emerging-threats-2019-data-breaches.html.
Accessed 14 Jan. 2020.
This web article from Norton provides information about the different data breaches that
had occurred in 2019 and statistics on cybersecurity in the first half of 2019. As the first half of
2019, there were 3,800 publicly disclosed breaches, 4.1 billion exposed data breaches, and a 54%
increase in the number of reported breaches when compared to the statistics from the first half of
2018. Then the source gives a list and information of the different data breaches that had
occurred, such as the company affected, date, and number of records breached. For example, in
financial data breaches, Capital One was affected on March 22 and 23, 2019, where there were
106 million records breached. Also it provides a description of what had happened, who was
affected, how they were affected, and the hacker’s performances.
This would be considered as a reliable source, since Norton is an anti-virus software
production company for many different operating systems. As well, the source includes the
source that they had used in their descriptions of the data breaches that occurred. Also, the
formatting of the website is broken down into the different categories of data breaches, such as
financial, entertainment, and etc, and it provides information for other people to take precautions
and be aware of the situation.
This blog post is about the benefits and consequences of vulnerability scanners,
describing its beneficial uses when used correctly and its harmful consequences when abused by
a black-hat hacker. The vulnerability scanners are meant to point out the weaknesses in a
website, which would notify the programmer to fix these weaknesses to prevent data breaches.
However, when in the hands of a black-hat hacker, these vulnerabilities are pointed out and it
makes it easier for the hacker to infiltrate the application if the programmer did not immediately
notice the weakness. The blog post also explains the characteristics of a vulnerability scanner,
such as automated tool, very noisy, able to access all code, and too targeted on a single request,
which could be a bad thing for the hackers.
Though this is a blog post, the author has experience in working with web security in his
past. As well, the blog post shines a negative light on something that is thought of as a tool in
order to prevent the increase of data breaches. This can propose a research question into the
structure of a vulnerability scanner and how the information and data can be accessed by the
user.
Rodriguez, Salvador. "Facebook Says Hackers Were Able to Access Millions of Phone
Numbers and Email Addresses." Cnbc, 12 Oct. 2018,
www.cnbc.com/2018/10/12/facebook-security-breach-details.html. Accessed 15
Jan. 2020.
This news article is also about the Facebook data breaches that occurred, mentioning that
30 million users were impacted, which is about 20 million fewer than the company first
announced. Also that out of the 30 million users, only 14 million users had their private
information, such as name, contact information, and recent location, was exposed. The news
article also gives background information of what happened and the company’s statements about
the attack. Facebook announced that the attacks began on September 14 and went undetected
until September 25. The team took about two days to fix all of the vulnerabilities, stopped the
attack, and reset all of the access tokens for the affected users. Facebook, along with the FBI
were conducting an investigation in order to find out who was behind the attack and their
motives for doing so. As a solution, Facebook created and published a website for users to check
if their accounts were affected by the data breach.
Unlike the other sources on the Facebook data breaches, this news article was published
about a month after Facebook had originally announced the attacks. Thus, making this source
more reliable than the others, since this has the updated information about the Facebook data
breaches.
Rosen, Guy. "An Update on the Security Issue." Facebook, 12 Oct. 2018,
about.fb.com/news/2018/10/update-on-security-issue/. Accessed 15 Jan. 2020.
This statement post is about the Facebook data breaches and Facebook’s vice president of
product management had made a statement trying to calm the public. Rosen mentions that
hackers had exploited a vulnerability in the code, which had been left unresolved since a period
between July 2017 and September 2018. Also, he makes a comment about an unusual spike of
activity that had begun just days prior to the attack, which led to Facebook starting their
investigation.
The statement post is most likely to be the most reliable source out of all of the sources
on the Facebook data breaches. This post is much more detailed about the discovery and the
vulnerabilities of the “View As” feature. As well, the author of the post is Guy Rosen, who
actually works for Facebook as the vice president of product management, making him able to
obtain first-hand information about the attacks, which most of the other sources had probably
used this statement post in their articles.
Rouse, Margaret. "Network Vulnerability Scanning." WhatIs,
searchsecurity.techtarget.com/definition/vulnerability-scanning. Accessed 15 Jan.
2020.
This article is about vulnerability scanning and the different approaches to scanning.
There are two different approaches, authenticated and unauthenticated methods. The
unauthenticated method allows the user to perform vulnerability scans for malicious uses, since
they don’t have a trusted access to a network. That type of scan could reveal the vulnerabilities
that can be accessed without logging into the network. Whereas, the authenticated scan allows
the user to log in as a network user, thus revealing vulnerabilities that are only accessible to a
trusted user or even a hacker that had gained access as a trusted user.
Similarly to the blog post about the dark side of vulnerability scanners, this source also
discusses the dangers of vulnerability scanners when abused by a user with malicious intent,
such as hackers. However, in this article post, the author, Rouse, offers a better and much more
technical term for the type of scan conducted by a malicious user.
Saifi, Yousef. "How Many People Play Fortnite? Concurrent and Registered 2019 Player
Count." fortniteinside.com, 4 Nov. 2019,
fortniteinsider.com/how-many-people-play-fortnite-concurrent-and-registered-20
19-player-count/. Accessed 14 Jan. 2020.
This game news article is about the number of people that play Fortnite and gives
statistics on the number of players since the games launch from more than two years ago. As
well the number of players only grew within the past few years as the game had introduced a
new map in its new chapter and season, which was well received by its players.
The news article is able to provide statistics for the background/introduction of the
research paper, since Fortnite was one of the major platforms that had been breached in the first
half of 2019, affecting countless online players worldwide.
Vizacarra, Lucero Davalos. "Top 10 Web Security Vulnerabilities to Watch out for in
2019." Cai.tools, 29 May 2019,
cai.tools.sap/blog/top-10-web-security-vulnerabilities-to-watch-out-for-in-2019/.
Accessed 15 Jan. 2020.
The web article is about the top ten web security vulnerabilities that are commonly seen
in 2019. The format of the website is that it gives an explanation of ratings, based on OWASP’s
scale. The ratings are broken down into three categories that it is evaluated on, exploitability
(how easy or difficult for an attacker to exploit), detectability (how easy or difficult for the
attacker and users to find them), and technical impact (the damage that can be caused). Then it
moves onto the actual list of vulnerabilities, providing information about what it is, more specific
types, examples, prevention methods, and the score/ratings.
This list provides many examples of vulnerabilities that are most commonly seen in 2019.
Meaning that this is keeping up with the current styles and techniques used by hackers, which
many cyber specialists are struggling with. Also, the rating and scoring is helpful as it shows
how dangerous the vulnerability is and how it can easily go undetected.
Zetter, Kim. "Hacker Lexicon: What Are DoS and DDoS Attacks?" Wired, 16 Jan. 2016,
www.wired.com/2016/01/hacker-lexicon-what-are-dos-and-ddos-attacks/.
Accessed 15 Jan. 2020.
The web article discusses DoS (denial of service) and DDos (distributed denial of
service) attacks that are currently on the rise and becoming more sophisticated each year. Both
are an attack that overwhelms a system with data, like a flood of requests made simultaneously
to a website, causing the server to crash. However, these are becoming more uncommon, since
there are more DDoS attacks that come from many computers throughout the internet, which can
either be hundreds or thousands at a time. The hackers typically use them for a variety of
reasons, some being expressing displeasure. For example, in 2011 there was an incident with the
hacktivist organization, Anonymous, where they launched a series of attacks against Paypal,
Visa, and Mastercard, which led providers unable to process donations for WikiLeaks.
The DoS and DDoS provide examples of exhibiting characteristics of a parameter
pattern. The parameter pattern is defined as malicious users making requests to modify its
parameters, while the DoS and DDoS are examples of requests that practically flood the
computer system.