Professional Documents
Culture Documents
Julia Campos - U4l10 Template - Cybercrime One-Pager Template
Julia Campos - U4l10 Template - Cybercrime One-Pager Template
Overview
When did the event happen?
Whose data was lost / stolen / leaked? How many people / organizations were affected?
Provide any other context necessary to understand the “big picture” of the event.
Data Specifics
What specific data was stolen? Try to avoid vague terms like “financial data” and instead find the specific pieces of
information like “credit card numbers”. Specific answers here will strengthen your explanation in the next section.
Sources
List all websites that you used to find any information you wrote here. Include the permanent URL. Identify the
author, title, source, the date you retrieved the source, and, if possible, the date the reference was written or
posted. You should number your sources, here is a template you can follow:
[1] Author’s Last name, First name. “Title of Web Page.” Title of Website, Publisher, Date, URL. Date retrieved.
[2] Author’s Last name, First name. “Title of Web Page.” Title of Website, Publisher, Date, URL. Date retrieved.
[3] ….
1
Unit 4 Lesson 10
2013
One of its many attacks, the Operation Safe Winter, happened in 2013 and had the goal to raise awareness about
homelessness through the collection, distribution and redistribution of resources. According to Wikipedia, “Three
missions using a charity framework were suggested in the original global spawning a variety of direct actions from
used clothing drives to pitch in community potlucks feeding events in the UK, US and Turkey”. Encouraging
participation from the general public, this operation has raised questions of privacy and the changing nature of the
Anonymous community's use of monikers.
2014
Another big cyberattack happened in 2014, after a fatal police shooting of unarmed African-American
Michael Brown in Ferguson, Missouri. The “Operation Ferguson” was an organized cyberprotest against the police
hosted in a set up website and a twitter profile. The Anonymous involved with this attack “promised that if any
protesters were harassed or harmed, they would attack the city's servers and computers, taking them offline”. The
internet crashed at the City Hall, phones died and e-mail systems were targeted.
2
Unit 4 Lesson 10
Multi-Factor Authentication
According to the site, using Multi- Factor Authentication is “Arguably the most effective thing you can do to
protect your online accounts [...] for as many of your accounts as possible. The method uses a secondary piece of
information—often a code generated by an app or sent via SMS—alongside a password”.
Password Manager
“All the passwords you use for your online accounts should be strong and unique. What this really means is
they should be long, include a mixture of different character types, and not be used across multiple websites.”
“The best way to do this is by using a password manager. Password managers create strong passwords for
you and store them securely. If the fact that they can stop you getting hacked isn’t enough to make you consider
using one, a password manager also means you never have to struggle to remember a forgotten password again.”
3
Unit 4 Lesson 10
Update Everything
“Every piece of technology you use […] is open to attack. Thankfully, companies are always finding new
bugs and fixing them. That’s why it’s crucial you download and update the latest versions of the apps and software
you’re using”.
Encrypt Everything
“Using encrypted services means that what you're sending is better protected against surveillance and
won’t be accessible if your device gets lost or stolen”.
“There are two main end-to-end encrypted messaging services, Signal and WhatsApp. Messages (including
photos and videos) plus voice calls and video calls are encrypted by default within both apps. They both also let you
use disappearing messages, which remove what you’ve sent after a set period of time. The practice can help keep
your chats private, even from those that have access to your devices. Our advice is to use Signal where possible,
as it collects less metadata than WhatsApp and isn’t owned by Facebook”.
sources :
[1] “Title of WebAnonymous (hacker group).” Wikipedia, March 04, 2022,
https://en.wikipedia.org/wiki/Anonymous_(hacker_group). March 9th 2022.
[2] Woolf, Nicky. “Title of Web Page.” Anonymous leaks identities of 350 alleged Ku Klux Klan members, The
Guardian, November 6th 2015, https://www.theguardian.com/technology/2015/nov/06/anonymous-ku-klux-klan-
name-leak, March 10th 2022.
[3] “Anonymous posts Ku Klux Klan alleged sympathizers list”, BBC News, November 06, 2015,
https://www.citationmachine.net/apa/cite-a-website/confirm March 10, 2022
[4] “6 Things You Need to Do to Prevent Getting Hacked” Wired, August 29, 2021,
https://www.wired.com/story/how-to-prevent-getting-hacked/
March 10 2022,