Project Description: The purpose of this project was to research cyber security related attacks that have happened in the past.
Article 1: Sandworm gang launches Monster ransomware attacks on Ukraine
This article share information about a ransomware attack performed on the country of Ukraine. The attacks were performed by a group of Russian hackers. This organization uses .NET type code to access the target's information. We could potentially protect ourselves from a ransomware attack by keeping good security software on devices and keep very tight and secure passwords.
Source Evaluation:
Who published the content? Jeff Burt
Where was it published? The Register
When was it published? Tue 29 Nov 2022
The truthfulness and integrity of the facts: Accurate, many links as well as in text citations used.
How is it written and presented? Very informative. No distractive ads or images until the bottom of the page when finished reading the article.
Links and Citations: Twitter links, Links to other articles under the same publisher, External articles cited.
Article 2: Beware of These Threats Surrounding FIFA World Cup
This article explains how phishing and scams are taking place at the 2022 world cup. Scammers are using phishing emails to provide fake Hayya cards and cryptocurrency. Crypto.com is an official sponsor of this tournament and people are being scammed into buying fake world cup themed crypto. Hayya cards are official cards that are required to go into the stadium to watch matches. Scammers are selling fake cards to make money.
Source Evaluation:
Who published the content? Cyware
Where was it published? Cyware.com
When was it published? November 30, 2022
The truthfulness and integrity of the facts: The website uses truthful facts. There are no quotes but there are clickable links that take you to other truthful websites.
How is it written and presented? It was written in a informative manner and explains each aspect of the scams in sections.
Links and Citations: There are links to other truthful websites. No citations.
Part of my assignment was to complete a cyber security training. After completing the course, I was awarded with the certificate above.
Lessons Learned: I learned how different scamming and hacking scenarios take place and how they are performed. I also learned that the internet and networks are dangerous places for vulnerable people and devices. I also learned how to be safe and protected on the internet by using vpns and following safe internet procedures.