You are on page 1of 2

Class Activity - Top Hacker Shows Us How It is Done

Objectives
Understand vulnerabilities of wireless and other common technologies
Part 1: View the TEDx Video “Top Hacker Shows Us How It’s Done; Pablos Holman at TEDxMidwests”
Part 2: Answer the following questions

Background / Scenario
Nearly every “secure” system that is used today can be vulnerable to some type of cyberattack.

Required Resources
• PC or mobile device with internet access

Instructions

Part 1: View the TEDx Video “Top Hacker Shows Us How It’s Done; Pablos
Holman at TEDxMidwests”
a. Locate the video on the internet and watch it.
b. Choose one of the hacks discussed by Mr. Holman in the video and use your favorite search engine to
conduct some additional research on the hack.
c. For the hack chosen in Step 1b, answer the questions below. Be prepared to share your work in a full
class discussion.

Part 2: Answer the following questions.


a. What is the vulnerability being exploited?

b. What information, data, or control can be gained by a hacker exploiting this vulnerability?

c. How is the hack performed?

d. What about this particular hack interested you specifically?

e. How do you think this particular hack could be mitigated?

© 2017 - 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 1 of 1 www.netacad.com
❖ ANSWER :

A. Vulnerabilities in firmware, operating system, software, brainware, web applications and others.
B. Personal data or profiles, history of browsers, and emails, as well as other important files.
C. Hacking is done by injecting a program or data on one of the personal accounts. Hackers will usually
create exploits that are in order to adjust to vulnerabilities that have been found. Every application
(service, desktop, web base) must have a gap or vulnerability, it's just not yet found out. Slowly will
be found also by hackers. Not all malicious hackers, if a security flaw is found by hackers, are likely
to be used to exploit the system.
D. I am very interested in studying this, in order to be able to take precautions on how to secure a
network or data so that it cannot be penetrated by hackers or attacker.
E. I think, this particular hack can be reduced by further tightening the security of a system and
avoiding vulnerabilities.

You might also like