$20 Bonus + 25% OFF
Securing Higher Grades Costing Your Pocket? Book Your Assignment at The Lowest Price Now!

CC6051 Incident Response For Cybercriminals Penetrating Equifax

tag 0 Download9 Pages / 2,005 Words tag Add in library Click this icon and make it bookmark in your library to refer it later. GOT IT
  • Course Code: CC6051
  • University: London Metropolitan University
  • Country: United Kingdom


You are to write a technical report investigating a specific topic area related to “computer hacking”. In doing this work, it is very important that you adhere to ethical norms and that you do not in any way use any software illegally or inappropriately. Below is a list of broad topics to choose from, although you may choose your own topic (subject
to approval by the tutor):
• Ethical, Professional and Legal Issues in Hacking
• Reconnaissance and Intelligence Gathering Methods
• Software/Hardware Tools used in Hacking
• Practical Hacking Methods and Techniques
• Phishing and Social Engineering Techniques in Hacking
• Hacking into the Cloud Systems
• Hacking into Mobile Devices
• Anti-Hacking Techniques and Tools



Hacking is the identification of weakness within computer networks to systems for exploiting different inadequacies to retrieve access. The following report analyzes various hardware and software tools utilized in hacking. This is because information is the most expensive resource for any business. Its security protects the image of the organization and helps in saving lots of money.

However, the main the objective of the research is to inform people regarding danger in hacking considering the Case Studies of the incidents that took place after January 2016. The incidents includes the cases of “Adult Friend Finder”,  “Under Armour/MyFitnessPal”, “WannaCry ransomware attack” and “Cybercriminals penetrating Equifax (EFX)” are demonstrated below. Here, in this study, a discussion is made on aims and objectives of the research on the usage of different hardware and software tools. Lastly, various General Data Protection Regulation or GDPR applications are investigated in this report.

Aims and objectives of the research:

As it pertains to hardware, the term hacking is commonly misused. There is a growing necessity in the today’s digital space after January 2016 to know how the existing electronics are modified to use it. This also includes understanding the enclosure and behaviour of the hardware. While looking to develop any device, some it is complicated to be aware of where to start. The angle of attack is also needed to be known and to know the areas for which it has not been designed.

Discussion on chosen Case studies:

Under Armour/MyFitnessPal

 Here about 1500 million people owning MyFitnessPal applications as owned by “United Armour” witness leakage of personal data. This included passwords, email addresses and usernames.

WannaCry ransomware attack

 This took place worldwide on May2017 by a cryptoworm. It targeted computers that were running Microsoft Windows through encrypting various data. Moreover, it demanded ransom payments in Bitcoins.


 This took place on July 29, 2017 where personal data of 143 million consumers has got their credit card exposed.

Adult Friend Finder

 It took place on October 2016 where more than 410 million accounts were damaged.

As one looks into the hardware section, one needs to approach the area where the hacking has been depending on and what it tries to do. It is required to know whether someone has been trying to make that wireless, and what the displays have been and what is needed to be done to get that to trigger on another device. Every hacker needs a separate viewpoint of attack and it hard to determine what process is required to proceed as one has never hacked previously. Lastly, it is necessary to determine the various conventional procedures of hardware hacking and implementations in which they are utilized.

The internet possesses various downsides and upsides. Hackings are used for malicious reasons and means to find problems in systems and notify authorities for helping them to fortify multiple defences better. Hence the aim of the report is to investigate the following.

  • To find out the areas of danger on behalf of the users to make that easier for hackers to continue their business after January 2016.
  • Tools and scripts used in hacking used by the intruders for their purpose.
  • To find the methods to stop hacking
  • Notify the authorities for fortifying defenses better.

The primary objective of this paper is to know the variety of applications and specially designed tools to assist hacking. Hacking tool is generally for gaining unauthorized access to PC for inserting worming, suffers, Trojan horses and viruses. It is also needed to know how the hacking program or tool is designed for helping the hacker. Further, the self-taught prodigy or specialized programmers who can modify the computer software or hardware external to the architectural design of the developers. 


Research on software/hardware tools used in hacking:

As seen from the above sections, that there has been rising concern to identify the hardware, software and wireless attacks used in piracy since 2016. For example, in the instance of Cybercriminals penetrating Equifax (EFX) hackers are unable to endorse any particularly. However, various vendors are selling wireless adapters or external wireless adapters and use real tech chipsets (Collins, 2018). AirPcap, for instance, is the best as one cracks within Windows since the drivers and devices have been stable under Windows as in the. Again Real Tech works very smartly on Linux and Windows through the drivers regarding promiscuous mode within Windows for actual tech chipsets has been slight flaky. For example, the Appendix 1 section illustrates the working principle of Hardsploit, which is a Metasploit-like tool used for hardware hacking.

However, individual antennas are not needed. Many smart hackers have chosen that has come up with stocked with real tech or AirPcap external and often buying one or two directional antennas for using point straight at an access point. Hence, one can receive better signal strength from a vast distance away. However, this not necessarily needed by others. It is seen that faster the attack gets, less time is required to spend on wireless.

Hackers have been keeping two operating systems handy, For example in the case of hacking Adult Friend Finder, Windows is chosen since running Wire Shark over Windows is more stable and usable than on Linux (Whittaker, 2018). For software, Network Monitor works on Windows. This is a great packet analysis tool and a stable and fast. However, it possesses some challenges regarding some parsers (Vetter et al., 2017). As per as hardware is concerned, a classic instance in security audits is using Raspberry Pi with proper battery pack, distribution platform such as Kali Linux and apps such as Kali Linux together is helpful for pen testing.

Again regarding software, Nikto is a smart choice which is an Open Source or GPL scanner of a web server. It performs comprehensive tests against various web servers for multiple items (Jackson, 2016). This includes over 3200 potentially harmful CGIs or Files, version specific issues on over 250 servers and versions over 620 servers. It was helpful for ransomware called WannaCry that spread around the world in 2017. Moreover, python programming is useful to develop own hacking tools. This is demonstrated in Appendix 2 section.  The next one is the Nessus remote Security Scanner when closed and essentially free as identified from the data breach incident at Under Armour/MyFitnessPal. It works with a framework of client-server. Further, it the most popular vulnerability scanner utilized on over 75,000 agencies across the globe ("Under Armour says 150 million MyFitnessPal accounts breached", 2018). The last one that is a useful tool in this case, is LAN turtle. These type of systems admin and pen-test tools delivers distant access as it is connected covertly to USB ports. Apart from this, it has been allowing users in harvesting information from a network and possesses a capacity for executing any middle-man attack. Lastly, the SDN or Software-Defined Networking is an effective paradigm to create future Internet architecture (DiMase et al., 2015). DELTA is regarded as the initial security evaluation framework for SDN. To understand the framework more effectively, Appendix 3 can be seen.

GDPR implications:

GDPR or General Data Protection Regulation has been able to replace “UK Data Protection Act” and has been impacting business that processes various personal customer data. As per as GDPR directive, personal data denotes to the info formation related to a person like upgrades on social networking websites, computer IP address, location details and so on (Macenaite, 2017). This latest protection law puts consumers in driver’s seat and the task to comply with regulation falling on organizations and business. GDPR, in short, applies to every business established at UK instead of whether the data processing has been taking place in EU or not. As the company provides services and goods to citizens in the UK as it is subjected to GDPR.

Every type of agencies working with personal data must be appointed to data protection officer or data controller who has been in charge of the GDPR compliance (Spindler & Schmechel, 2016). There has been a severe penalty for the business who never complies with GDPR fines that are up to 4% of yearly worldwide revenue. Various companies have been thinking that GDPR is only a problem with IT. However, it is very much away from reality. This comprises of a wide-sweeping implication for the overall company. This includes the process the companies has been handle marketing and performing sales activities (Bieker et al. 2016).


Thus to continue the research from the perspective of a consultant or security researcher and social engineering and various other tools various aspects are to be considered. Of this importance must be given to understand attackers who have been penetrating into the targeted system. The research has shown that data is a valuable currency in this world. However, for further progress it must be kept in mind that GDPR has been creating challenges and problems for business apart from creating opportunity. In future, organizations that have been showing that they have been valuing the privacy of people alone from being legal compliance should build more profound trust and have more loyal customers. This must also include the business that has been transparent regarding how data is utilized, designing and implementing improved and new ways and controlling customer data across the entire life-cycle.  

Future work:

As primary software and hardware gets developed under corporate environment and closed-source negotiating power of marginalized social users and groups are diminished sufficiently. Different forms of counter-mobilization and reactive efforts might appear in future. This might also have a vital efefc6. However, these kinds of reactive efforts are been constrained through technical codes. These are built to technologies through those in power. Fort the future open source world, the actors would comprise of more degree of freedom. This has been allowing proactive modification and shaping of technologies including use and design. The future engineers should look at the products from the attacker’s perspective. Thus they need to consider benefits from cyberattacks and understand how to make the attacks more costly. 



Ateniese, G., Mancini, L. V., Spognardi, A., Villani, A., Vitali, D., & Felici, G. (2015). Hacking smart machines with smarter ones: How to extract meaningful data from machine learning classifiers. International Journal of Security and Networks, 10(3), 137-150.

Bieker, F., Friedewald, M., Hansen, M., Obersteller, H., & Rost, M. (2016, September). A process for data protection impact assessment under the European general data protection regulation. In Annual Privacy Forum (pp. 21-37). Springer, Cham.

Collins, K. (2018). Equifax stock is plummeting after it announced a massive hack affecting 143 million US consumers. Retrieved from

DiMase, D., Collier, Z. A., Heffner, K., & Linkov, I. (2015). Systems engineering framework for cyber physical security and resilience. Environment Systems and Decisions, 35(2), 291-300.

Hacking Tools with Python: Part 1. (2018). InfoSec Resources. Retrieved 18 April 2018, from | Retrieved 2018, from

Jackson, D. (2016). HACKING: Ultimate Beginner's Guide to Computer Hacking in 2016 Hacking for Beginners, Hacking University, Hacking Made Easy, Hacking Exposed, Hacking Basics, How To Hack, Penetration Testing.

Macenaite, M. (2017). From universal towards child-specific protection of the right to privacy online: Dilemmas in the EU General Data Protection Regulation. New Media & Society, 19(5), 765-779.

Peerlyst. (2018). Retrieved 18 April 2018, from

Spindler, G., & Schmechel, P. (2016). Personal Data and Encryption in the European General Data Protection Regulation. J. Intell. Prop. Info. Tech. & Elec. Com. L., 7, 163.

Under Armour says 150 million MyFitnessPal accounts breached. (2018). Retrieved from

Vetter, J., Almgren, A., DeMar, P., Riley, K., Antypas, K., Bard, D., ... & Hack, J. (2017). Advanced Scientific Computing Research Exascale Requirements Review. An Office of Science review sponsored by Advanced Scientific Computing Research, September 27-29, 2016, Rockville, Maryland. Argonne National Lab.(ANL), Argonne, IL (United States). Argonne Leadership Computing Facility.

Whittaker, Z. (2018). AdultFriendFinder network hack exposes 412 million accounts. Retrieved from

Download Sample

Get 100% money back after download, simply upload your unique content* of similar no. of pages or more. We verify your content and once successfully verified 100% value credited to your wallet within 7 days.

Upload Unique Document

Document Under Evaluation

Get Credits into Your Wallet

*The content must not be available online or in our existing Database to qualify as unique.

Cite This Work

To export a reference to this article please select a referencing stye below:

My Assignment Help. (2020). Incident Response For Cybercriminals Penetrating Equifax. Retrieved from

"Incident Response For Cybercriminals Penetrating Equifax." My Assignment Help, 2020,

My Assignment Help (2020) Incident Response For Cybercriminals Penetrating Equifax [Online]. Available from:
[Accessed 07 August 2020].

My Assignment Help. 'Incident Response For Cybercriminals Penetrating Equifax' (My Assignment Help, 2020) <> accessed 07 August 2020.

My Assignment Help. Incident Response For Cybercriminals Penetrating Equifax [Internet]. My Assignment Help. 2020 [cited 07 August 2020]. Available from: is the pioneer of providing top-quality essay help at an affordable price. With the strength of 3000+ qualified and experienced experts, we are competent of providing best quality essay assistance in more than 100 subjects. Students, who wonder, 'who can help me with my essay' find our online essay help services beneficial and useful. Contact our 24x7 live customer support team to get high-quality essay writing help at an affordable price.

Latest Management Samples

HAT202 The Hospitality And Tourism Market 2

Download : 0 | Pages : 5
  • Course Code: HAT202
  • University: Kaplan Business School
  • Country: United States

Answer: Introduction The objective of the report is to analyse the information about the business portfolio of the Hungry Jack’s fast food organization. The company is an Australian franchise of Burger King Company that is operating in Australia from 1971. Food and beverages industry of the tourism and hospitality segment is chosen to analyse the innovation trends present in the environment.  The business portfolio of Hungry Jack&r...

Read More arrow Tags: Australia Vale Park 9 Hospitality Other 

BUS110 Workplace Learning 1

Download : 0 | Pages : 15
  • Course Code: BUS110
  • University: Charles Sturt University
  • Country: Australia

Answer: Introduction  The job market comprises of group of people who are looking for jobs within the current economy. It comprises of a variety of jobs that the employers are willing to the offer and the employees are ready to accept. For instance the Australian Job market has a strong future because of the increasing number of people who are ready to work (Challis et al., 2018). There is an expected growth in the Australian job market ...

Read More arrow Tags: Australia Melbourne 28 workplace learning 1 Other 

MKT340 International Management 2

Download : 0 | Pages : 20
  • Course Code: MKT340
  • University: Charles Sturt University
  • Country: Australia

Answer: Introduction The business which is operating at an international level needs to possess knowledge about international management. This knowledge is important for the organization to grow as well as to expand globally. This management requires the skill set and knowledge beyond normal business knowledge (Morschett, Schramm-Klein & Zentes, 2015). The company needs to be familiar with the regulations set for the business in the co...

Read More arrow Tags: Australia Burwood 9 International Management Other 

BUS510 Organisational Learning And Change 3

Download : 0 | Pages : 2

Answer: Personal Reflection of Senge’s Book, “The Fifth Discipline” These chapters have been interesting to read through since they give vivid explanation and examples on why some business fail while other succeed. The author explains the concepts of organization learning in an interesting manner that is intriguing for the reader. Use of real life examples makes one to relate with what is happening currently in various organ...

Read More arrow Tags: Australia Arlington Management University of New South Wales 

ACC203 Financial Accounting 2

Download : 0 | Pages : 5
  • Course Code: ACC203
  • University: Kaplan University
  • Country: United States

Answer: Introduction The information in the email regarding the accoutring issues sent to me on 13 November 2017 is acknowledged by Magenta and Associates. In response to the email relevant amendments and advice is been drafted in the letter, which could be useful for the board of Beachlife Ltd in making adequate decision. Furthermore, the amendments and advice provided by the accounting team is reliable, as it is backed by years of experienc...

Read More arrow

Save Time & improve Grade

Just share Requriment and get customize Solution.

We will use e-mail only for:

arrow Communication regarding your orders

arrow To send you invoices, and other billing info

arrow To provide you with information of offers and other benefits




Overall Rating



Our Amazing Features


On Time Delivery

Our writers make sure that all orders are submitted, prior to the deadline.


Plagiarism Free Work

Using reliable plagiarism detection software, only provide customized 100 percent original papers.


24 X 7 Live Help

Feel free to contact our assignment writing services any time via phone, email or live chat.


Services For All Subjects

Our writers can provide you professional writing assistance on any subject at any level.


Best Price Guarantee

Our best price guarantee ensures that the features we offer cannot be matched by any of the competitors.

Our Experts

Assignment writing guide
student rating student rating student rating student rating student rating 5/5

1265 Order Completed

97% Response Time

James Cook

Masters in Management

Wellington, New Zealand

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

134 Order Completed

95% Response Time

Thomas Nelson

MS in Information Systems Technology with Specialization in Database Administration

New Jersey, United States

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

184 Order Completed

96% Response Time

Arapera Billing

Masters in Management, MMgt

Wellington, New Zealand

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

798 Order Completed

97% Response Time

Benjamin Blakeman

MSc in Medical Technology

London, United Kingdom

Hire Me

FREE Tools


Plagiarism Checker

Get all your documents checked for plagiarism or duplicacy with us.


Essay Typer

Get different kinds of essays typed in minutes with clicks.


GPA Calculator

Calculate your semester grades and cumulative GPa with our GPA Calculator.


Chemical Equation Balancer

Balance any chemical equation in minutes just by entering the formula.


Word Counter & Page Calculator

Calculate the number of words and number of pages of all your academic documents.

Refer Just 5 Friends to Earn More than $2000

Check your estimated earning as per your ability




Your Approx Earning

Live Review

Our Mission Client Satisfaction

Awesome work. Awesome response time. Very thorough & clear. Love the results I get with MAH!


User Id: 383727 - 31 Jul 2020


student rating student rating student rating student rating student rating

Work was done in a timely manner took it through grammarly checked for plagiarism very well satisfied


User Id: 463334 - 31 Jul 2020


student rating student rating student rating student rating student rating

Great work for the short notice given. Thank you for never disappointing and helping out.


User Id: 194216 - 31 Jul 2020


student rating student rating student rating student rating student rating

I received a full point on the assignment. Thank you for all the help with the assignment.


User Id: 411395 - 31 Jul 2020


student rating student rating student rating student rating student rating
callback request mobile
Have any Query?