SlideShare a Scribd company logo
Qusstion Read the passage and answer the questiots that follow: A ranomeare pang calling itself
"Snatch" - affer the iconic Guy Ritchic film relensed in 2000 - has daimed responsibility for
exfilarating 200 icrabytes of data from the South African Department of Defence (DOD). The
group has apparcently posted enly a fraction of the data it stole onliee, releasing a 4996B
compressed archive that it says catracts to anouse coefirmed that the leak appeared legitimate.
They said the data came froe the DOD, not an affiliated company like Armscor or Denet. In
addition to leaking DOD data, Seatch also posted the contact infoemation of screnal senior
government officiab online - including phone numbers it says belong so Cyril Ramaphosa.
Checking the lise of eight cellphone numbers against Truecaller's database revealed that two
could belone to South Africa's sieting president. According to sybernecurity compary Sophos,
Snatch wass an antack medel network throogh haman-directed action. Their malware reboots
Windosas machines into Safe Mode before enerypting the data they wish to hold ransom. The
attackens may be using this technique to circurnent endpoint protestion, which often won't ran in
Safe Mode," Sopbos. said. When it discovered this attack vtctor in 2019 . Sophos quickly raiked
the alarm as the severity of rasooemware that runs in Safe Mode was a significam threat. In
adsition to the novel modus eperandi. Sophos also found froms recruitenent past that Snasch eely
accegicd Rusian speakers inte the gang. lnserestingly, the Russian-language gang chose the weck
ef the BRICS Summit, which is being hosted in South Africa, to release the data it exfiliraled
from the DOD. Accorting to Seatch itwelf, this was no coincidence. The projoct is a year old,
about 2007T of data was extracted during the year," it kaid ita a post online. Serocnishot from
the Seatch ransomware proup'i website aboul data it stale from the South African Depurtment of
Defence Snahch sad in specifically cheoe the weck of Ee BRICS mummir to reflease the data. It
then wed the opsortunity to spread its messape that South Afrnca is Lundering arms foe the
United Stanes and mesey fec corporations, They also accused Ramaphosa of beine the main
anms baron of the black continent of the main gaket foe latsdering arms contracts in the USA."
AdAitionally, the attackers said. The BRICS suminih for Africa is jus a sereen tssucd by the
whate masters finm a coumtry wish a ceenantly sumbling president.- Snatch's statement fevealed
a telativily poos prase of geopolitics and Soust Africa's donsestic polities. Ramaphosa's
government has keen routinely criticied for its unaligned stance on Russia's invasion of Ukraine,
Potinical analysts have warned that South Afnea stands to be cocluded from the United States'
African Gifontl and Oportunity Aet (AGOA), losing ou on bellions in exports. Feemer Warld
Bank presickem David Malpass warned Sondh Africa was playing with fire by trying to play
conareries agaitut ene another, which coulat hart the country's relationship with the IS, IS rowet
ambassades to South Africa, Reuben Briecty, accused South Africa of supplyine weapen and
ammunitive to Ressia carlier this year. This was afler the Russian cargo ship Lady R
ceetroversially docked at the Simon's. Toan naval tase so oflood weipons Sondh Africa had R
refianed to Rusia emply. a piece of Chappies [bubble gum]," In adilition to their claims that
South Afriea was a bed with the Linided Stanes, Seatch also said their website has faced contant
denial-of-senice anacks since posting the South African DOD lesk. "The folks from the Ministry
of Defenic (of beir American curators) ecally do not want this informatios to pop up al the
sannain's eve to spend a couple of extra millioa dollars ko destroy our sceitce of information
Several days Later, the group said it was beginfing to feel respect for Africa. Neither the
Americans not the Europeans could afford to spend such resources to attack our project," they
claimed. "Repecsentatives of South Africa have been doing this foe the thind day in a fore, and,
jadping malion] a day. But frankly speakine, they would rather spend this money on their
aetwork. iefrastructure and secerity."
MyEroadband contacted the Department of Defence for comment. fi did not ropond by
publicatioe. Following media reposts about the data becach, the attacken have statod that they are
not the "Snatch" rancemware gang, "We have nothing to do widh the Snatch ransomware project
that appeared in 2019 and existed for about 2 years," they claim. We ane the Security
Notification Attachment iSNAtch for shont) Team, a grosep specialtzing cuclusively in leaked
sensitive data." The group said it does not deal in rancomarare. "We doa"t aim to stop a company
[or critical infrastructure] from operating by attacking it with soffuare that blocks the control
servers." Snath statcd. If joamulists analyze ewr work carcfully, they will see that not a single
cliem of ours has boen attacked by a maluare that can be callod Snatch." they said. "Yes, many
of them have been antacked by various rassonsware, as we ate open for cooperation and often
groups that week in this diection give us unique confidential dats that were leaked from the
attacked companies. But ence again, the Saanch locker that we ane compared to in the media has
never been used. 1. What afe the common velecrabilinies and Artack Types that you know? 2.
What are some risk and security mssessments shoold the department of defence undertake? 3. In
terms of riak tesponse what woeld you alvise the department of defenee to de? 4. Every
organisation mua plas and ealine security policies, ie the document the incident regpone must be
clearly defined. tise the six stages of mecident respoese to help the departmest of defesce to
handle the situation above. 5. List perevention methods that the department shoald think of when
implementing their systems. 6. Would a firewall help in this case? Explais your madentanding of
a fetwall in referesec is the case above. Portect 7. What are your vieus on dotection systens? Do
you think is will help is making nere that the department of defence systems are sectur? 8.
Fixplain the ClA Triad 9. Briefly expiain wene of the enerryptien tectaplegies Do you think
goveminents ahould be allowed to use wach lools? In South Africa how will this contradict POPI
ACT?

More Related Content

Similar to Qusstion Read the passage and answer the questiots that follow A ran.pdf

Us gov't building hacker army for cyber war yahoo! news
Us gov't building hacker army for cyber war   yahoo! newsUs gov't building hacker army for cyber war   yahoo! news
Us gov't building hacker army for cyber war yahoo! newsMarioEliseo3
 
Beza belayneh information_warfare_brief
Beza belayneh information_warfare_briefBeza belayneh information_warfare_brief
Beza belayneh information_warfare_briefBeza Belayneh
 
HE Mag_New Cyber Threats_ITSource
HE Mag_New Cyber Threats_ITSourceHE Mag_New Cyber Threats_ITSource
HE Mag_New Cyber Threats_ITSourceBrian Arellanes
 
Cyberterror & ciberwarfare - SILVA JR., Nelmon J.
Cyberterror & ciberwarfare - SILVA JR., Nelmon J.Cyberterror & ciberwarfare - SILVA JR., Nelmon J.
Cyberterror & ciberwarfare - SILVA JR., Nelmon J.
Autônomo
 
The Operations Of The National Security Agency
The Operations Of The National Security AgencyThe Operations Of The National Security Agency
The Operations Of The National Security Agency
Toya Shamberger
 
ISIS Cyber Terrorism Analysis
ISIS Cyber Terrorism AnalysisISIS Cyber Terrorism Analysis
LAST ISSUE -CYBER ESPIONAGEBusinesses and government agencies in.docx
LAST ISSUE -CYBER ESPIONAGEBusinesses and government agencies in.docxLAST ISSUE -CYBER ESPIONAGEBusinesses and government agencies in.docx
LAST ISSUE -CYBER ESPIONAGEBusinesses and government agencies in.docx
smile790243
 
Privacy in the Information Age
Privacy in the Information AgePrivacy in the Information Age
Privacy in the Information Age
Jordan Peacock
 
Privacy in the Information Age [Q3 2015 version]
Privacy in the Information Age [Q3 2015 version]Privacy in the Information Age [Q3 2015 version]
Privacy in the Information Age [Q3 2015 version]
Jordan Peacock
 
s4x15whychinaoriranwouldtargetusnationalcriticalinfrastructure
s4x15whychinaoriranwouldtargetusnationalcriticalinfrastructures4x15whychinaoriranwouldtargetusnationalcriticalinfrastructure
s4x15whychinaoriranwouldtargetusnationalcriticalinfrastructureBill Hagestad II
 
'The How & Why China & Iran Would Successfully Target US Critical Infratsruct...
'The How & Why China & Iran Would Successfully Target US Critical Infratsruct...'The How & Why China & Iran Would Successfully Target US Critical Infratsruct...
'The How & Why China & Iran Would Successfully Target US Critical Infratsruct...
Bill Hagestad II
 
4. Search the Web for uses of Big Data in homeland security. Specifi.pdf
4. Search the Web for uses of Big Data in homeland security. Specifi.pdf4. Search the Web for uses of Big Data in homeland security. Specifi.pdf
4. Search the Web for uses of Big Data in homeland security. Specifi.pdf
sktambifortune
 
ESSENTIALS OF Management Information Systems 12eKENNETH C..docx
ESSENTIALS OF Management Information Systems 12eKENNETH C..docxESSENTIALS OF Management Information Systems 12eKENNETH C..docx
ESSENTIALS OF Management Information Systems 12eKENNETH C..docx
debishakespeare
 
ESSENTIALS OF Management Information Systems 12eKENNETH C.
ESSENTIALS OF Management Information Systems 12eKENNETH C.ESSENTIALS OF Management Information Systems 12eKENNETH C.
ESSENTIALS OF Management Information Systems 12eKENNETH C.
ronnasleightholm
 
Denial & Deception – Week 7Select one of the ‘Questions to Pon.docx
Denial & Deception – Week 7Select one of the ‘Questions to Pon.docxDenial & Deception – Week 7Select one of the ‘Questions to Pon.docx
Denial & Deception – Week 7Select one of the ‘Questions to Pon.docx
ruthannemcmullen
 
Who is the next target and how is big data related ulf mattsson
Who is the next target and how is big data related   ulf mattssonWho is the next target and how is big data related   ulf mattsson
Who is the next target and how is big data related ulf mattssonUlf Mattsson
 
Review DNI WTAs for 2015 and 2016 (see attached). Compare and con.docx
Review DNI WTAs for 2015 and 2016 (see attached). Compare and con.docxReview DNI WTAs for 2015 and 2016 (see attached). Compare and con.docx
Review DNI WTAs for 2015 and 2016 (see attached). Compare and con.docx
ronak56
 
Mark Anderson on Cyber Security
Mark Anderson on Cyber SecurityMark Anderson on Cyber Security
Mark Anderson on Cyber Security
Meg Weber
 

Similar to Qusstion Read the passage and answer the questiots that follow A ran.pdf (20)

Us gov't building hacker army for cyber war yahoo! news
Us gov't building hacker army for cyber war   yahoo! newsUs gov't building hacker army for cyber war   yahoo! news
Us gov't building hacker army for cyber war yahoo! news
 
Beza belayneh information_warfare_brief
Beza belayneh information_warfare_briefBeza belayneh information_warfare_brief
Beza belayneh information_warfare_brief
 
NCSO
NCSONCSO
NCSO
 
HE Mag_New Cyber Threats_ITSource
HE Mag_New Cyber Threats_ITSourceHE Mag_New Cyber Threats_ITSource
HE Mag_New Cyber Threats_ITSource
 
Cyberterror & ciberwarfare - SILVA JR., Nelmon J.
Cyberterror & ciberwarfare - SILVA JR., Nelmon J.Cyberterror & ciberwarfare - SILVA JR., Nelmon J.
Cyberterror & ciberwarfare - SILVA JR., Nelmon J.
 
IT_Cutter_Publication
IT_Cutter_PublicationIT_Cutter_Publication
IT_Cutter_Publication
 
The Operations Of The National Security Agency
The Operations Of The National Security AgencyThe Operations Of The National Security Agency
The Operations Of The National Security Agency
 
ISIS Cyber Terrorism Analysis
ISIS Cyber Terrorism AnalysisISIS Cyber Terrorism Analysis
ISIS Cyber Terrorism Analysis
 
LAST ISSUE -CYBER ESPIONAGEBusinesses and government agencies in.docx
LAST ISSUE -CYBER ESPIONAGEBusinesses and government agencies in.docxLAST ISSUE -CYBER ESPIONAGEBusinesses and government agencies in.docx
LAST ISSUE -CYBER ESPIONAGEBusinesses and government agencies in.docx
 
Privacy in the Information Age
Privacy in the Information AgePrivacy in the Information Age
Privacy in the Information Age
 
Privacy in the Information Age [Q3 2015 version]
Privacy in the Information Age [Q3 2015 version]Privacy in the Information Age [Q3 2015 version]
Privacy in the Information Age [Q3 2015 version]
 
s4x15whychinaoriranwouldtargetusnationalcriticalinfrastructure
s4x15whychinaoriranwouldtargetusnationalcriticalinfrastructures4x15whychinaoriranwouldtargetusnationalcriticalinfrastructure
s4x15whychinaoriranwouldtargetusnationalcriticalinfrastructure
 
'The How & Why China & Iran Would Successfully Target US Critical Infratsruct...
'The How & Why China & Iran Would Successfully Target US Critical Infratsruct...'The How & Why China & Iran Would Successfully Target US Critical Infratsruct...
'The How & Why China & Iran Would Successfully Target US Critical Infratsruct...
 
4. Search the Web for uses of Big Data in homeland security. Specifi.pdf
4. Search the Web for uses of Big Data in homeland security. Specifi.pdf4. Search the Web for uses of Big Data in homeland security. Specifi.pdf
4. Search the Web for uses of Big Data in homeland security. Specifi.pdf
 
ESSENTIALS OF Management Information Systems 12eKENNETH C..docx
ESSENTIALS OF Management Information Systems 12eKENNETH C..docxESSENTIALS OF Management Information Systems 12eKENNETH C..docx
ESSENTIALS OF Management Information Systems 12eKENNETH C..docx
 
ESSENTIALS OF Management Information Systems 12eKENNETH C.
ESSENTIALS OF Management Information Systems 12eKENNETH C.ESSENTIALS OF Management Information Systems 12eKENNETH C.
ESSENTIALS OF Management Information Systems 12eKENNETH C.
 
Denial & Deception – Week 7Select one of the ‘Questions to Pon.docx
Denial & Deception – Week 7Select one of the ‘Questions to Pon.docxDenial & Deception – Week 7Select one of the ‘Questions to Pon.docx
Denial & Deception – Week 7Select one of the ‘Questions to Pon.docx
 
Who is the next target and how is big data related ulf mattsson
Who is the next target and how is big data related   ulf mattssonWho is the next target and how is big data related   ulf mattsson
Who is the next target and how is big data related ulf mattsson
 
Review DNI WTAs for 2015 and 2016 (see attached). Compare and con.docx
Review DNI WTAs for 2015 and 2016 (see attached). Compare and con.docxReview DNI WTAs for 2015 and 2016 (see attached). Compare and con.docx
Review DNI WTAs for 2015 and 2016 (see attached). Compare and con.docx
 
Mark Anderson on Cyber Security
Mark Anderson on Cyber SecurityMark Anderson on Cyber Security
Mark Anderson on Cyber Security
 

More from faisalbags

QUESTION 2 (14 marks)(17 minutes) FUAC03G Commence this question on a.pdf
QUESTION 2 (14 marks)(17 minutes) FUAC03G Commence this question on a.pdfQUESTION 2 (14 marks)(17 minutes) FUAC03G Commence this question on a.pdf
QUESTION 2 (14 marks)(17 minutes) FUAC03G Commence this question on a.pdf
faisalbags
 
Question 1 It was the worst fire in the history of Welland. At 100.pdf
Question 1 It was the worst fire in the history of Welland. At 100.pdfQuestion 1 It was the worst fire in the history of Welland. At 100.pdf
Question 1 It was the worst fire in the history of Welland. At 100.pdf
faisalbags
 
Q3b (5 points) Sue operates a food truck on Florida beaches, where sh.pdf
Q3b (5 points) Sue operates a food truck on Florida beaches, where sh.pdfQ3b (5 points) Sue operates a food truck on Florida beaches, where sh.pdf
Q3b (5 points) Sue operates a food truck on Florida beaches, where sh.pdf
faisalbags
 
Property, Plant, and Equipment Land Buildings Less Accumulate.pdf
Property, Plant, and Equipment Land Buildings Less Accumulate.pdfProperty, Plant, and Equipment Land Buildings Less Accumulate.pdf
Property, Plant, and Equipment Land Buildings Less Accumulate.pdf
faisalbags
 
Please mark all correct statements A Demand for rubber is more elasti.pdf
Please mark all correct statements A Demand for rubber is more elasti.pdfPlease mark all correct statements A Demand for rubber is more elasti.pdf
Please mark all correct statements A Demand for rubber is more elasti.pdf
faisalbags
 
PA 7-6 (Algo) JCL Incorporated is a major chip manufacturing... JCL I.pdf
PA 7-6 (Algo) JCL Incorporated is a major chip manufacturing... JCL I.pdfPA 7-6 (Algo) JCL Incorporated is a major chip manufacturing... JCL I.pdf
PA 7-6 (Algo) JCL Incorporated is a major chip manufacturing... JCL I.pdf
faisalbags
 
On January 1, 20Y1, Marlow Corporation had the following shareholders.pdf
On January 1, 20Y1, Marlow Corporation had the following shareholders.pdfOn January 1, 20Y1, Marlow Corporation had the following shareholders.pdf
On January 1, 20Y1, Marlow Corporation had the following shareholders.pdf
faisalbags
 
On January 1,2025 , Sheffield Corporation redeemed $430,000 of bond.pdf
On January 1,2025 , Sheffield Corporation redeemed $430,000 of bond.pdfOn January 1,2025 , Sheffield Corporation redeemed $430,000 of bond.pdf
On January 1,2025 , Sheffield Corporation redeemed $430,000 of bond.pdf
faisalbags
 
Recording Transactions, Preparing Journal Entries, Posting to T-Accou.pdf
Recording Transactions, Preparing Journal Entries, Posting to T-Accou.pdfRecording Transactions, Preparing Journal Entries, Posting to T-Accou.pdf
Recording Transactions, Preparing Journal Entries, Posting to T-Accou.pdf
faisalbags
 
Rainey Enterprises loaned $50,000 to Smali Company on June 1, Year 1,.pdf
Rainey Enterprises loaned $50,000 to Smali Company on June 1, Year 1,.pdfRainey Enterprises loaned $50,000 to Smali Company on June 1, Year 1,.pdf
Rainey Enterprises loaned $50,000 to Smali Company on June 1, Year 1,.pdf
faisalbags
 

More from faisalbags (10)

QUESTION 2 (14 marks)(17 minutes) FUAC03G Commence this question on a.pdf
QUESTION 2 (14 marks)(17 minutes) FUAC03G Commence this question on a.pdfQUESTION 2 (14 marks)(17 minutes) FUAC03G Commence this question on a.pdf
QUESTION 2 (14 marks)(17 minutes) FUAC03G Commence this question on a.pdf
 
Question 1 It was the worst fire in the history of Welland. At 100.pdf
Question 1 It was the worst fire in the history of Welland. At 100.pdfQuestion 1 It was the worst fire in the history of Welland. At 100.pdf
Question 1 It was the worst fire in the history of Welland. At 100.pdf
 
Q3b (5 points) Sue operates a food truck on Florida beaches, where sh.pdf
Q3b (5 points) Sue operates a food truck on Florida beaches, where sh.pdfQ3b (5 points) Sue operates a food truck on Florida beaches, where sh.pdf
Q3b (5 points) Sue operates a food truck on Florida beaches, where sh.pdf
 
Property, Plant, and Equipment Land Buildings Less Accumulate.pdf
Property, Plant, and Equipment Land Buildings Less Accumulate.pdfProperty, Plant, and Equipment Land Buildings Less Accumulate.pdf
Property, Plant, and Equipment Land Buildings Less Accumulate.pdf
 
Please mark all correct statements A Demand for rubber is more elasti.pdf
Please mark all correct statements A Demand for rubber is more elasti.pdfPlease mark all correct statements A Demand for rubber is more elasti.pdf
Please mark all correct statements A Demand for rubber is more elasti.pdf
 
PA 7-6 (Algo) JCL Incorporated is a major chip manufacturing... JCL I.pdf
PA 7-6 (Algo) JCL Incorporated is a major chip manufacturing... JCL I.pdfPA 7-6 (Algo) JCL Incorporated is a major chip manufacturing... JCL I.pdf
PA 7-6 (Algo) JCL Incorporated is a major chip manufacturing... JCL I.pdf
 
On January 1, 20Y1, Marlow Corporation had the following shareholders.pdf
On January 1, 20Y1, Marlow Corporation had the following shareholders.pdfOn January 1, 20Y1, Marlow Corporation had the following shareholders.pdf
On January 1, 20Y1, Marlow Corporation had the following shareholders.pdf
 
On January 1,2025 , Sheffield Corporation redeemed $430,000 of bond.pdf
On January 1,2025 , Sheffield Corporation redeemed $430,000 of bond.pdfOn January 1,2025 , Sheffield Corporation redeemed $430,000 of bond.pdf
On January 1,2025 , Sheffield Corporation redeemed $430,000 of bond.pdf
 
Recording Transactions, Preparing Journal Entries, Posting to T-Accou.pdf
Recording Transactions, Preparing Journal Entries, Posting to T-Accou.pdfRecording Transactions, Preparing Journal Entries, Posting to T-Accou.pdf
Recording Transactions, Preparing Journal Entries, Posting to T-Accou.pdf
 
Rainey Enterprises loaned $50,000 to Smali Company on June 1, Year 1,.pdf
Rainey Enterprises loaned $50,000 to Smali Company on June 1, Year 1,.pdfRainey Enterprises loaned $50,000 to Smali Company on June 1, Year 1,.pdf
Rainey Enterprises loaned $50,000 to Smali Company on June 1, Year 1,.pdf
 

Recently uploaded

Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
CarlosHernanMontoyab2
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
Anna Sz.
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 

Recently uploaded (20)

Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 

Qusstion Read the passage and answer the questiots that follow A ran.pdf

  • 1. Qusstion Read the passage and answer the questiots that follow: A ranomeare pang calling itself "Snatch" - affer the iconic Guy Ritchic film relensed in 2000 - has daimed responsibility for exfilarating 200 icrabytes of data from the South African Department of Defence (DOD). The group has apparcently posted enly a fraction of the data it stole onliee, releasing a 4996B compressed archive that it says catracts to anouse coefirmed that the leak appeared legitimate. They said the data came froe the DOD, not an affiliated company like Armscor or Denet. In addition to leaking DOD data, Seatch also posted the contact infoemation of screnal senior government officiab online - including phone numbers it says belong so Cyril Ramaphosa. Checking the lise of eight cellphone numbers against Truecaller's database revealed that two could belone to South Africa's sieting president. According to sybernecurity compary Sophos, Snatch wass an antack medel network throogh haman-directed action. Their malware reboots Windosas machines into Safe Mode before enerypting the data they wish to hold ransom. The attackens may be using this technique to circurnent endpoint protestion, which often won't ran in Safe Mode," Sopbos. said. When it discovered this attack vtctor in 2019 . Sophos quickly raiked the alarm as the severity of rasooemware that runs in Safe Mode was a significam threat. In adsition to the novel modus eperandi. Sophos also found froms recruitenent past that Snasch eely accegicd Rusian speakers inte the gang. lnserestingly, the Russian-language gang chose the weck ef the BRICS Summit, which is being hosted in South Africa, to release the data it exfiliraled from the DOD. Accorting to Seatch itwelf, this was no coincidence. The projoct is a year old, about 2007T of data was extracted during the year," it kaid ita a post online. Serocnishot from the Seatch ransomware proup'i website aboul data it stale from the South African Depurtment of Defence Snahch sad in specifically cheoe the weck of Ee BRICS mummir to reflease the data. It then wed the opsortunity to spread its messape that South Afrnca is Lundering arms foe the United Stanes and mesey fec corporations, They also accused Ramaphosa of beine the main anms baron of the black continent of the main gaket foe latsdering arms contracts in the USA." AdAitionally, the attackers said. The BRICS suminih for Africa is jus a sereen tssucd by the whate masters finm a coumtry wish a ceenantly sumbling president.- Snatch's statement fevealed a telativily poos prase of geopolitics and Soust Africa's donsestic polities. Ramaphosa's government has keen routinely criticied for its unaligned stance on Russia's invasion of Ukraine, Potinical analysts have warned that South Afnea stands to be cocluded from the United States' African Gifontl and Oportunity Aet (AGOA), losing ou on bellions in exports. Feemer Warld Bank presickem David Malpass warned Sondh Africa was playing with fire by trying to play conareries agaitut ene another, which coulat hart the country's relationship with the IS, IS rowet ambassades to South Africa, Reuben Briecty, accused South Africa of supplyine weapen and ammunitive to Ressia carlier this year. This was afler the Russian cargo ship Lady R ceetroversially docked at the Simon's. Toan naval tase so oflood weipons Sondh Africa had R
  • 2. refianed to Rusia emply. a piece of Chappies [bubble gum]," In adilition to their claims that South Afriea was a bed with the Linided Stanes, Seatch also said their website has faced contant denial-of-senice anacks since posting the South African DOD lesk. "The folks from the Ministry of Defenic (of beir American curators) ecally do not want this informatios to pop up al the sannain's eve to spend a couple of extra millioa dollars ko destroy our sceitce of information Several days Later, the group said it was beginfing to feel respect for Africa. Neither the Americans not the Europeans could afford to spend such resources to attack our project," they claimed. "Repecsentatives of South Africa have been doing this foe the thind day in a fore, and, jadping malion] a day. But frankly speakine, they would rather spend this money on their aetwork. iefrastructure and secerity." MyEroadband contacted the Department of Defence for comment. fi did not ropond by publicatioe. Following media reposts about the data becach, the attacken have statod that they are not the "Snatch" rancemware gang, "We have nothing to do widh the Snatch ransomware project that appeared in 2019 and existed for about 2 years," they claim. We ane the Security Notification Attachment iSNAtch for shont) Team, a grosep specialtzing cuclusively in leaked sensitive data." The group said it does not deal in rancomarare. "We doa"t aim to stop a company [or critical infrastructure] from operating by attacking it with soffuare that blocks the control servers." Snath statcd. If joamulists analyze ewr work carcfully, they will see that not a single cliem of ours has boen attacked by a maluare that can be callod Snatch." they said. "Yes, many of them have been antacked by various rassonsware, as we ate open for cooperation and often groups that week in this diection give us unique confidential dats that were leaked from the attacked companies. But ence again, the Saanch locker that we ane compared to in the media has never been used. 1. What afe the common velecrabilinies and Artack Types that you know? 2. What are some risk and security mssessments shoold the department of defence undertake? 3. In terms of riak tesponse what woeld you alvise the department of defenee to de? 4. Every organisation mua plas and ealine security policies, ie the document the incident regpone must be clearly defined. tise the six stages of mecident respoese to help the departmest of defesce to handle the situation above. 5. List perevention methods that the department shoald think of when implementing their systems. 6. Would a firewall help in this case? Explais your madentanding of a fetwall in referesec is the case above. Portect 7. What are your vieus on dotection systens? Do you think is will help is making nere that the department of defence systems are sectur? 8. Fixplain the ClA Triad 9. Briefly expiain wene of the enerryptien tectaplegies Do you think goveminents ahould be allowed to use wach lools? In South Africa how will this contradict POPI ACT?