Number Theory Question

Question One: Security people

Solution 1A: Link: https://twitter.com/DAlperovitch/status/1285603552656859137 shows how two Chinese hackers stole the IP, including those for Covid-19 research. The tweet focuses on how the ministry can use hackers to acquire information.

Solution 1B: Link https://twitter.com/anton_chuvakin/status/1244772141830000640 shows how security measures are well-spoken but hard to implement. For instance, people are encouraged to encrypt everything.

Solution 1C: Link: https://twitter.com/gcluley/status/1354852647887626245 shows that security researchers are supposed to take their work seriously. They are supposed to understand that hackers from North Korea are not their friends.

Solution 1D: Link: https://twitter.com/dangoodin001/status/988861154951741440?ref_src=twsrc%5Etfw%7Ctwcamp%5Etweetembed%7Ctwterm%5E988861154951741440%7Ctwgr%5E%7Ctwcon%5Es1_&ref_url=https%3A%2F%2Ftechbeacon.com%2Fsecurity%2Ftop-25-infosec-leaders-follow-twitter shows how Amazon was hijacked and the cryptocurrency stolen. The tweet is interesting as the event was suspicious, and the company could have taken caution.

Solution 1E: Link: https://twitter.com/mikko/status/989150769638232064?ref_src=twsrc%5Etfw%7Ctwcamp%5Etweetembed%7Ctwterm%5E989150769638232064%7Ctwgr%5E%7Ctwcon%5Es1_&ref_url=https%3A%2F%2Ftechbeacon.com%2Fsecurity%2Ftop-25-infosec-leaders-follow-twitter show how to come up with master keys that open doors for different hotel rooms. The tweet demonstrates how the doors can be opened.

DETAILED ASSIGNMENT

2021020204353220210201223423cyber_security_homework__1_

Powered by WordPress