Skip to content
Permalink
1f9e4ebd5e
Switch branches/tags

Name already in use

A tag already exists with the provided branch name. Many Git commands accept both tag and branch names, so creating this branch may cause unexpected behavior. Are you sure you want to create this branch?
Go to file
 
 
Cannot retrieve contributors at this time
40 lines (24 sloc) 1.26 KB
This week we looked at several case studies showing real world hacking events.
For Example
## The Mangham Case:
https://www.zdnet.com/article/british-student-jailed-for-hacking-into-facebook/
https://www.bbc.co.uk/news/uk-england-york-north-yorkshire-17079853
- A Technical Hack of Facebook
- Reported and Accepted
- When Mangham went to "Check" if the flaw was fixed, they threw the book at him
## News of the World Phone Hacking
https://resources.infosecinstitute.com/case-study-news-world-phone-hacking-scandal-notw/#gref
- Taking advantage of Default security settings to "Hack" voicemail systems
## And a People Focused issue of password Security
https://peoplesec.org/2017/06/26/3-real-life-ethical-hacker-stories-passwordfails/
Phishing for passwords to get high level access.
# Task
Coursework Preparation time.
In Groups: (I would suggest Tables)
- Pick one of the case studies above, or choose your own.
- Research this and look for the elements required for the coursework
- Prepare a short presentation (~5 Mins) on the topic addressing the points
## Reminder of the topics needed for the coursework:
- Technical Details of the Hack Itself
- Legal and Ethical Issues
- Can we think of Similar Hacks that may have happened