170k views
1 vote
Briefly summarise your chosen cyberattack and identify how in the chosen attack the attacker may have used Information Gathering? ii. Identify which vulnerabilities if any were used? e.g., try to identify and explain any relevant terminologies where encountered. iii. How did the attacker exploit the vulnerability? i.e., which exploits were used and/or how was access gained? iv. What could have been done to prevent the attack?

User Seyhan
by
7.9k points

1 Answer

3 votes

Final answer:

Hackers use various tactics to gain unauthorized access to systems and steal sensitive information. Hacking can be stopped or reduced by implementing strong cybersecurity measures.

Step-by-step explanation:

Hackers use various tactics to gain unauthorized access to systems and steal sensitive information. They may use techniques like social engineering, phishing, malware, and brute force attacks. The stolen information can include personal data, financial details, login credentials, intellectual property, and more. Hackers can sell the stolen data on the dark web, use it for identity theft, or leverage it for financial gain.



Hacking can be stopped or reduced by implementing strong cybersecurity measures such as regular software updates, using strong and unique passwords, educating users about phishing and social engineering techniques, employing firewalls and intrusion detection systems, and conducting regular security audits.

User Jqurious
by
7.3k points