0% found this document useful (0 votes)
11 views6 pages

Ethical Hacking

The document discusses the concepts of cyberspace and cybersecurity, highlighting their definitions, importance, and historical context. It explains how cyberspace serves as a virtual environment for interaction and information exchange, while cybersecurity focuses on protecting systems and data from cyber threats. Additionally, it details a specific hacking incident involving Uber, outlining the attack method, perpetrator, and consequences, along with recommended security measures.

Uploaded by

alex
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
11 views6 pages

Ethical Hacking

The document discusses the concepts of cyberspace and cybersecurity, highlighting their definitions, importance, and historical context. It explains how cyberspace serves as a virtual environment for interaction and information exchange, while cybersecurity focuses on protecting systems and data from cyber threats. Additionally, it details a specific hacking incident involving Uber, outlining the attack method, perpetrator, and consequences, along with recommended security measures.

Uploaded by

alex
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 6

1

ETHICAL HACKING

Student’s name
Institution
Instructor’s name
ETH2100
February 21, 2025
2

ETHICAL HACKING
Task 1: Cyberspace
Concept of Cyberspace and Cybersecurity
Cyberspace defines the virtual, interconnected environment formed by computer

networks, essentially representing the digital space in which information is kept, conveyed and

obtained via the internet, encompassing each and everything from online communication, social

media platforms, to storage of data and transactions. It is also regarded as the space where users

interact with one another digitally, even though it does not exist in physical in the real world.

While cybersecurity on the other hand involves protecting systems, networks and data

from the cyberattack. The technologies, tools and processes such firewalls, malware protection

and antivirus are used to defend against threats such as phishing, ransomware as well as identity

theft (Bekkestad, 2012). People are taught on how to understand and follow fundamental

cybersecurity principles involving setting strong passwords as well as being wary of email

attachments. The organizations are encouraged to have unified threat management tool to assist

in automating security operations

Background of Cyberspace and Cybersecurity


Cyberspace is virtual world made by links among computers, internet enhanced devices, servers,
routers as well as other infrastructure of internet components. However, this term was by the
American-Canadian Author William Gibson in the year 1982 when publishing the Omni
Magazine and in the book called Neuromancer (Bekkestad, 2012). According to Gibson,
Cyberspace defines the creation of a computer network in a world filled with artificial intelligent
creatures. In famous community, in the 90s, cyberspace was regarded term of describing
locations where human beings interacted while using the internet. This is the platform for online
games, chat room lands and instant talk. Its is also offer a room for socializing and political
debates with the general development of web-based discussion boards and blogs (Zdzikot, 2022).
Blogs are often implemented by humans who have personal writing and usually give endless
comments and links elsewhere on the website. This means that the blogs are seen as an
opportunity for public discussion in Cyberspace but they do not exist in the offline world.
3

Cybersecurity defines the act, technologies and polices needed for protecting computer

networks, computer systems, and data from unauthorized access, disruption and damage via

malicious cyberattack. Cybersecurity plays a major role when it comes to safeguarding sensitive

information involving personal details, financial data as well as critical infrastructure by creating

measures that detects, prevent and respond to cyberattacks such as phishing, ransomware,

malware and data breaches. Kevin Mitnick is regarded as the first Cybercriminal. Between 1970

and 1995, Mitnick accessed some of the most security and secure networks of the world,

involving Nokia and Motorola (Zdzikot, 2022). Mitnick used the complex social engineering tool

to give passwords and values that were inputted by the corporate employee. He was arrested by

the federal bureau of investigation and stopped at a series of federal expenses. Mitnick became a

cybersecurity consultant and auditor after prison.

Cybersecurity therefore, is all about providing security to internet connected devices and

services from malicious hackers and cybercriminals.

Importance of Cyberspace and Cybersecurity


Importance of Cyberspace
Cyberspace offer room for humans to exchange their idea as well as to freely access

information. In addition to that, cyberspace also enables businesses to run online and reach

clients. Its is through cyberspace that different businesses are able to compete with each other

online.

Importance of Cybersecurity
Cybersecurity is important as it helps in protecting data, networks as well as the computer

system from cyberattacks. The businesses are able to comply with regulations as a result of

cybersecurity (Zdzikot, 2022). The data of customers are also protected as a result of
4

cybersecurity. Cybersecurity is essential when it comes to protecting data from theft, loss, and

corruption. The data protected by cybersecurity are personally identifiable data, sensitive data

and protected health information.

Its through cybersecurity that computer networks and system are able to be protected

from unauthorized access.

In addition to that, its is through cybersecurity that customers and stakeholders are able to

build their trust.

References

Bekkestad, E. (2012). Forsvarets fellesoperative doktrine–anvendelig verktøy eller

støvsamler? (Master's thesis, Forsvarets høgskole).

Zdzikot, T. (2022). Cyberspace and cybersecurity. Cybersecurity in Poland, 9.

https://library.oapen.org/bitstream/handle/20.500.12657/51461/9783030785512.pdf?

sequence=1#page=23.

Task 2: Penetration Testing Reports


Task 3: Analysis of a Hacking Incident
HOW the attack was carried out
The Uber attack was brought out through a social engineering strategy where a

programmer, logical buying took qualifications from an outsider project worker on the dark web,

reached an Uber employee using an instant message claiming to be from the IT division, fooling

them into giving their secret word and accessing the organization's inside frameworks, including

delicate Leeway channels, by bypassing multifaceted validation through control; taking


5

advantage of a weakness in the worker for hire's entrance and utilizing that to penetrate Uber's

organization (Parasram et al.,2018, p.200).

WHO was behind the attack


The 18-year-old hacker was behind the attack. He revealed the attack’s details in a

conversation with cybersecurity researcher Corben Leo.

WHAT the consequences of the attack.


As per The Register, the screen captures spilled on Twitter show: "A gatecrasher has

undermined Uber's AWS cloud account and its assets at the managerial level; dealt with the

corporate Leeway work area as well as its Google G Suite account that has over 1PB of

stockpiling being used

Measures
According to Halton & Weaver (2018, p.300), the vital measures from the Uber data breach. A
few basic online protection examples can be gained from the Uber data breach.
 Implementing cyber awareness training.
 Know about normal MFA double-dealing techniques.
 Never hardcode administrator login qualifications anyplace
 Implementing a data leak detection service.

References
Parasram, S. V., Samm, A., Boodoo, D., Johansen, G., Allen, L., Heriyanto, T., & Ali, S.

(2018). Kali Linux 2018: Assuring Security by Penetration Testing: Unleash the

full potential of Kali Linux 2018, now with updated tools. Packt Publishing Ltd.

Halton, W., & Weaver, B. (2018). Kali Linux 2018: Windows Penetration Testing:

Conduct Network Testing, Surveillance, and Pen Testing on MS Windows Using

Kali Linux 2018. Packt Publishing Ltd.

Task 4: Responder
6

You might also like