You are on page 1of 2

Class Activity – Top Hacker Shows Us How It is Done

Objectives
Understand vulnerabilities of wireless and other common technologies

Background / Scenario
Nearly every “secure” system that is used today can be vulnerable to some type of cyberattack.

Required Resources
• PC or mobile device with Internet access

Step 1: View the TEDx Video “Top Hacker Shows Us How It’s Done; Pablos Holman at
TEDxMidwests”
a. Click on the link below and watch the Video.
Top Hacker Shows Us How It’s Done; Pablos Holman at TEDxMidwests
In the video, Mr. Holman discusses various security vulnerabilities concerning systems that are typically
considered as secure, however, as he points out in his presentation, they are all vulnerable to attack.
b. Choose one of the hacks discussed by Mr. Holman in the video, and using your favorite search engine
conduct some additional research on the hack.
c. For the hack chosen in Step 1b, answer the questions below. Be prepared to share your work in a full
class discussion.

Step 2: Answer the following questions.


a. What is the vulnerability being exploited?
Credit card

b. What information or data can be gained by a hacker exploiting this vulnerability?


Hackers can exploits credit card numbers, Name, DOB, passwords/PIN, credit balance, and
fraudulent/unauthorized withdrawal/transactions

c. How is the hack performed?


i. Hacking into bussinness account by breaching a company account where you used your
credit card to make a transaction.m
ii. Skimming
iii. Installing malware or viruses
iv. Phishing scams
v. Dumpster diving
.

d. What about this particular hack interested you specifically?


My special interest in this attack/hack is its due to its propensity of its gaining prominence
nowadays as everyone is embarking on a cashless business transaction which brings about a lot
of security challenges.
e. How do you think this particular hack could be mitigated?
According to investpodia, the following ways can be deployed to protect against credit card
hacking.
i. Be smart about passwords or PIN
ii. Do not sign up for high priced fraud protection
iii. Watch for phishing scams
iv. Beware of websites you provide your credit cards details
v. Block or freeze account as you notice a breach
vi. Get replacement
vii. Always insert your cards in RFID protective wallets

Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 1 of 1 www.netacad.com

You might also like