1
ETHICAL HACKING
Student’s name
Institution
Instructor’s name
ETH2100
February 21, 2025
2
ETHICAL HACKING
Task 1: Cyberspace
Concept of Cyberspace and Cybersecurity
Cyberspace defines the virtual, interconnected environment formed by computer
networks, essentially representing the digital space in which information is kept, conveyed and
obtained via the internet, encompassing each and everything from online communication, social
media platforms, to storage of data and transactions. It is also regarded as the space where users
interact with one another digitally, even though it does not exist in physical in the real world.
While cybersecurity on the other hand involves protecting systems, networks and data
from the cyberattack. The technologies, tools and processes such firewalls, malware protection
and antivirus are used to defend against threats such as phishing, ransomware as well as identity
theft (Bekkestad, 2012). People are taught on how to understand and follow fundamental
cybersecurity principles involving setting strong passwords as well as being wary of email
attachments. The organizations are encouraged to have unified threat management tool to assist
in automating security operations
Background of Cyberspace and Cybersecurity
Cyberspace is virtual world made by links among computers, internet enhanced devices, servers,
routers as well as other infrastructure of internet components. However, this term was by the
American-Canadian Author William Gibson in the year 1982 when publishing the Omni
Magazine and in the book called Neuromancer (Bekkestad, 2012). According to Gibson,
Cyberspace defines the creation of a computer network in a world filled with artificial intelligent
creatures. In famous community, in the 90s, cyberspace was regarded term of describing
locations where human beings interacted while using the internet. This is the platform for online
games, chat room lands and instant talk. Its is also offer a room for socializing and political
debates with the general development of web-based discussion boards and blogs (Zdzikot, 2022).
Blogs are often implemented by humans who have personal writing and usually give endless
comments and links elsewhere on the website. This means that the blogs are seen as an
opportunity for public discussion in Cyberspace but they do not exist in the offline world.
3
Cybersecurity defines the act, technologies and polices needed for protecting computer
networks, computer systems, and data from unauthorized access, disruption and damage via
malicious cyberattack. Cybersecurity plays a major role when it comes to safeguarding sensitive
information involving personal details, financial data as well as critical infrastructure by creating
measures that detects, prevent and respond to cyberattacks such as phishing, ransomware,
malware and data breaches. Kevin Mitnick is regarded as the first Cybercriminal. Between 1970
and 1995, Mitnick accessed some of the most security and secure networks of the world,
involving Nokia and Motorola (Zdzikot, 2022). Mitnick used the complex social engineering tool
to give passwords and values that were inputted by the corporate employee. He was arrested by
the federal bureau of investigation and stopped at a series of federal expenses. Mitnick became a
cybersecurity consultant and auditor after prison.
Cybersecurity therefore, is all about providing security to internet connected devices and
services from malicious hackers and cybercriminals.
Importance of Cyberspace and Cybersecurity
Importance of Cyberspace
Cyberspace offer room for humans to exchange their idea as well as to freely access
information. In addition to that, cyberspace also enables businesses to run online and reach
clients. Its is through cyberspace that different businesses are able to compete with each other
online.
Importance of Cybersecurity
Cybersecurity is important as it helps in protecting data, networks as well as the computer
system from cyberattacks. The businesses are able to comply with regulations as a result of
cybersecurity (Zdzikot, 2022). The data of customers are also protected as a result of
4
cybersecurity. Cybersecurity is essential when it comes to protecting data from theft, loss, and
corruption. The data protected by cybersecurity are personally identifiable data, sensitive data
and protected health information.
Its through cybersecurity that computer networks and system are able to be protected
from unauthorized access.
In addition to that, its is through cybersecurity that customers and stakeholders are able to
build their trust.
References
Bekkestad, E. (2012). Forsvarets fellesoperative doktrine–anvendelig verktøy eller
støvsamler? (Master's thesis, Forsvarets høgskole).
Zdzikot, T. (2022). Cyberspace and cybersecurity. Cybersecurity in Poland, 9.
https://library.oapen.org/bitstream/handle/20.500.12657/51461/9783030785512.pdf?
sequence=1#page=23.
Task 2: Penetration Testing Reports
Task 3: Analysis of a Hacking Incident
HOW the attack was carried out
The Uber attack was brought out through a social engineering strategy where a
programmer, logical buying took qualifications from an outsider project worker on the dark web,
reached an Uber employee using an instant message claiming to be from the IT division, fooling
them into giving their secret word and accessing the organization's inside frameworks, including
delicate Leeway channels, by bypassing multifaceted validation through control; taking
5
advantage of a weakness in the worker for hire's entrance and utilizing that to penetrate Uber's
organization (Parasram et al.,2018, p.200).
WHO was behind the attack
The 18-year-old hacker was behind the attack. He revealed the attack’s details in a
conversation with cybersecurity researcher Corben Leo.
WHAT the consequences of the attack.
As per The Register, the screen captures spilled on Twitter show: "A gatecrasher has
undermined Uber's AWS cloud account and its assets at the managerial level; dealt with the
corporate Leeway work area as well as its Google G Suite account that has over 1PB of
stockpiling being used
Measures
According to Halton & Weaver (2018, p.300), the vital measures from the Uber data breach. A
few basic online protection examples can be gained from the Uber data breach.
Implementing cyber awareness training.
Know about normal MFA double-dealing techniques.
Never hardcode administrator login qualifications anyplace
Implementing a data leak detection service.
References
Parasram, S. V., Samm, A., Boodoo, D., Johansen, G., Allen, L., Heriyanto, T., & Ali, S.
(2018). Kali Linux 2018: Assuring Security by Penetration Testing: Unleash the
full potential of Kali Linux 2018, now with updated tools. Packt Publishing Ltd.
Halton, W., & Weaver, B. (2018). Kali Linux 2018: Windows Penetration Testing:
Conduct Network Testing, Surveillance, and Pen Testing on MS Windows Using
Kali Linux 2018. Packt Publishing Ltd.
Task 4: Responder
6