Question: Question 1 Explain the pros and cons of static data masking. Question 2 Specify at least four major security problems associated with the Cloud Infrastructure-as-a-Service.

Question 1

Explain the pros and cons of static data masking.

Question 2

Specify at least four major security problems associated with the Cloud Infrastructure-as-a-Service.

Question 3

SQL injection is a common type of attacks to database servers. In 2014, a university in the United

States became a victim of such an SQL injection attack against one of its servers which stored

personal information about students and staff. The attack exploited a vulnerability in the outdated

database server software to steal personal details of about 900 students and staff. The attacker then

contacted the university officials, detailing the breach and making extortion threat. As the university

refused to hand over the credentials, the attacker posted the stolen information on a public website.

Which security goal (Availability/Integrity/Confidentiality) was compromised by this SQL injection

attack? Explain your reasoning.

Suggest three (3) necessary actions that should have been taken by the affected organisation to

prevent such an attack from happening and causing damage. For each action, briefly explain

how it helps.

Question 4

Ransomware attacks are a major data security concern nowadays. In 2016, a ransomware attack

known as Petya targeted at computers running certain vulnerable Windows operating systems. In

this attack, the victim received an email purporting a job application. It directed the victim to a zip

file containing a malicious program which appeared to the victim as a PDF document. Once the

victim allowed this malicious program to be executed at the administrator privilege, the ransomware

encrypted the master file table and this effectively removed all mappings to actual files on the hard

disk. The ransomware then demanded payment from the victim.

Which security goal (Availability/Integrity/Confidentiality) was compromised in this case? Explain

your reasoning.

Suggest three (3) necessary actions that should have been taken by the affected organisations

to address this security threat. For each action, briefly explain how it helps.

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!