Permalink
Cannot retrieve contributors at this time
Name already in use
A tag already exists with the provided branch name. Many Git commands accept both tag and branch names, so creating this branch may cause unexpected behavior. Are you sure you want to create this branch?
DADA/Articles/st24_the_hacked.md
Go to fileThis commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
28 lines (21 sloc)
1.13 KB
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
--- | |
title: The Hacked | |
--- | |
# The Verizon Data Breach Digest | |
For this section, we ask you to read the article linked below | |
("Lifting the Lid off Cybercrime") from Verizon. Each year, Verizon | |
publish reports on the security work they have been doing, with | |
aggregate statistics, changes in trends and other useful information | |
for security professionals. They have also started publishing these | |
case files, which detail specific security breaches that they have | |
dealt with. The people and organisations are anonymised in almost all | |
cases, but the reports are fantastically useful for seeing how real | |
security breaches occur and how they are detected and investigated. | |
https://www.verizon.com/about/news/lifting-lid-cybercrime | |
Read through one (or more) case studies on the Verizon site, and write | |
a short (~500 worlds) report on the breach. | |
- What caused the breach in the first place? | |
- What technical aspects did the hackers use? | |
- What kinds of data or information was targetted? | |
Discuss your findings in the Forum. | |
[LD comment: Do we want the students to read all 4 stories linked? Is there anything we want them to do with this reading?]() |