Urgenthomework logo
UrgentHomeWork
Live chat

Loading..

Research On The Cyber Security case study Solution | Case Study Sample

Research on The Cyber Security & Approaches To Defense:

Linux is one of the most used OS when it comes down to the servers. It is true that vulnerability in Linux are arising as the time passes. Hence, many big organizations are running down the Bounty programs to get them on the safer side and even a big leap in getting security for themselves. This technique has decreased the hacking scenarios and has increased the awareness towards cybersecurity.Today, we are going to talk about the recent vulnerability that was been disclosed in the Linux systems. Below is the description.

Network Monitoring Using Security:

The Traffic monitoring is also an important concept as it can be used to increase the chances of being vulnerable as much time it takes to get less traffic. As, chances of being exploited with attacks such as DoS & DDoS attacks. The networking of the whole system is being done mostly on Linux so understanding Linux to attend the traffic in the system with full proof of vulnerability.

Linux Vulnerability:

The vulnerability was very severe and consists of the programming issue in the ELF files in linux kernel while the kernel loads.

The exploiters had written an malicious program known as Position Independent Executable(PIE)which was able to exploit the loader and will be able to map the rest of the part of the Application's data segments which was been registered over the memory area and was reserved for the stack.

This completely resulted in the memory corruption and was then possible to get the local privilige escalations.

The flaw was completely representing the possible mechanism for any exploiter or hacker to put up a normal user as root and then acquire the control over the system easily.

The patch of the vulnerability was given away recently past two days and the sysadmins were advised to patch the systems for prevention of more hacks.

Hence, this is how the linux security is exploited and with the help of the possible exploits and pitfalls in the system there are many hacks happening in the systems with Linux.

Exploiting The Vulnerabilities:

In Linux, there are penetration tester softwares that test the vulnerabilities and make the world aware of the security issues that are contained in the systems. The system will then get to know about the cyber security and getting into the facts of the applications is also very important.

The vulnerabilities that are pretty much available in the Internet and are exploited are as follows:

  • Remote Code Execution (RCE)
  • Phishing
  • XSS Attacks
  • SQL Injections
  • DoS & DDoS Attacks

Hence, these are the vulnerabilities that are being indentified on the bigger scale in the market and are being exploited by many security professionals and hackers.

Methodologies:

The impact of the vulnerabilities on the organization may be very intense if not focused on. To keep the network running and fine we need to overcome these vulnerabilities and create patches for these vulnerabilities otherwise the impact of these vulnerabilities will be very immense.

The network if contains any of these vulnerabilities and if not focused on removing the vulnerability it can be exploited by anybody resulting in decrease in the privacy.
It will also result in getting the security of the network in trouble and can be compromised by anyone anytime.

Hence, these are the impacts of the vulnerabilities and how must one deal with these vulnerabilities.

Ebay Hack:

This was 4 months back the massive data breach in the e-bay website which left more than 100 million registered users under an hacked situation. This was an vulnerability test but still it was quite a big and massive data breaches running in wild from long time.

Details Of Breach:

The breach consists of the authentication problem and it became very easy for one to change the password of the users with the reset link, which sounded like little of the problem but would have become one of the wildest running vulnerability if it would have been in the wrong hands.

The breach was been identified by an security researcher and sent the details of the vulnerability to the e-bay team and then they started patching it. This vulnerability was not caught by any hacker so e-bay was at a bit safe side.

The vulnerbility was exploited using one of the most common things which can be used to hack. The forget password link, this link was activated by the attacker which resulted in sending an reset link to the victim.

But the attacker, kept on sending the reset password. The attacker intercepted the request and saved the reqInput value which was then triggered again and again for which the user clicks the link and then resets the password but the password is been set by the attacker using the same reqInput link.

Hence, this is what the exploit encountered recently in e-bay website.

About The Researcher

The security researcher was from Egypt named Yaseer.H.Ali. As, he is an security researcher as soon as he came to know about the exploit he reported to Ebay and the exploit was patched and now the website is running fine with it can be never done to the website.

Thanks to the researcher.

Consequences:

The consequences of the exploit would be very immense and disturbing if it would have been exploited in the wild. It would have resulted in declaring many wrong things to the group.Some of them are stated below:

It would have resulted in losing all the privacy of the users.

It would have left all the credit card, debit card numbers of the users open to all the hackers.

Acquiring the account may have altered many things in the account which may have resulted in very bad consequences.

Hence, these are the consequences that would have happened if it would have been reached to many hacking groups.

Div Table styles are a great way to layout website sections on the page! Make sure you bookmark this useful free online HTML tool!

Research On The Cyber Security, Case study Homework Help,Case Study Sample Assignment, case study help,case study assignment help,help with case study,case study helper,case study writing services

Copyright © 2009-2023 UrgentHomework.com, All right reserved.