Question: When you run the script I have provided, you will see a new database named hackmageddon created and it will contain one table named q1data.

When you run the script I have provided, you will see a new database named "hackmageddon" created and it will contain one table named "q1data". The Q1Data table contains a total of 12 fields, which are described below:

  1. Date Reported - This is the date the incident was publicly reported. Every record has a date reported value
  2. Date Occurred - Sometimes this value is null or a range like November 2020. Because it is optional, it may not be as useful as the Date Reported field.
  3. Date Discovered - Sometimes this value is null or a range like November 2020. Because it is optional, it may not be as useful as the Date Reported field.
  4. Author - This field identifies the author or source of the attack, if it is known.
  5. Target - Company/Person targeted by the attack. Sometimes this value is ambiguous like "multiple targets".
  6. Description - Description of the attack and who was targeted.
  7. Attack - Type of attack used. In this dataset, the types of attacks are:
    1. Malware
    2. Unknown
    3. Account Takeover
    4. Vulnerability
    5. Targeted Attack
    6. Misconfiguration
    7. Fake Websites/Social Network accounts
    8. Business Email Compromise
    9. DDoS
    10. Zoom bombing
    11. Malicious Browser Extension
    12. Malicious Script Injection
    13. Defacement
    14. Credential Stuffing
    15. >1
    16. DNS Hijacking
    17. SQLi
    18. Malvertising
    19. Brute-Force
    20. Evil Contract
    21. Web shells
    22. SPAM
    23. Malicious Google search ads
    24. SIM swap
    25. Windows Bit locker
    26. Malicious Wordpress plugin
    27. SEO Spam
    28. Password-spray
    29. Compromised certificate
  8. Target Class - This field is used to designate the industry of the attack victim. Possible values in this data set are:
    1. Multiple Industries
    2. Human health and social work
    3. Individual
    4. Public admin, defence, social security
    5. Education
    6. Professional scientific technical activities
    7. Financial and insurance
    8. Other service activities
    9. Manufacturing
    10. Administration and support service
    11. Information and communication
    12. Unknown
    13. Arts entertainment and recreation
    14. Transportation and storage
    15. Electricity gas steam air conditioning
    16. Wholesale and retail
    17. Fintech
    18. Accommodation and food service
    19. Real estate
    20. Extraterritorial organizations and bodies
    21. Water supply, waste management, remediation
  9. Attack Class - This field is used to designate the implied motivations for the attack. Possible values are:
    1. CC - Cyber Crime
    2. CE - Cyber Espionage
    3. N/A - undetermined
    4. CW - Cyber Warfare
    5. H - Hacktivism
    6. >1 - More than one motivation
  10. Country - This field indicates what country the target is located in. Sometimes the value is N/A or >1 (multiple countries)
  11. Link - URL containing information about the attack.
  12. Tags - Metadata tags for the event, probably not useful for our purposes.

 

This dataset contains 714 records. Your task for this project will be to create the database by running the provided script and then create several SQL queries on the data. 

 

 

Question:

 

Number of Attacks by Motivation in March - I need help writing a query that shows the number of attacks that occurred for each motivation category only during the month of March. Sort the results in descending order. You will combine techniques from the previous two queries to get this to work. Sample results:

Result Grid AttackClass CC CE N/A H CW Filter Rows: NumMotivation 232


 

Result Grid AttackClass CC CE N/A H CW Filter Rows: NumMotivation 232 29 942

Step by Step Solution

3.39 Rating (143 Votes )

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock

To retrieve the number of attacks by motivation category in March you can use SQL to filter the data... View full answer

blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!