Professional Documents
Culture Documents
Critical Thinking Final Project
Critical Thinking Final Project
Brief Description
The project reveals the vulnerabilities in the system of FEU Roosevelt. It also
demonstrates the possibility of a data breach and how a breach of the personal information of the
students can be prevented. It is based on Digital Sustainability where the researchers aim to
educate their peers about potential hacking activities and how it affects their data privacy. It also
aims to tighten the existing security measures of FEU Roosevelt’s NetSuite and Wi-Fi system.
Based on our careful observation, (1) the default passwords of FEU Roosevelt’s NetSuite
and Wi-Fi system have an easily crackable pattern. If you want to gain unauthorized access to
a student’s NetSuite account or steal their Wi-Fi account, all you need is their student number
and their surname. Unfortunately, (2) Microsoft Outlook has a loophole that can expose
anyone’s student number along with their surname. Presumably, anyone who has not yet
changed their default NetSuite passwords has their account ready for anyone to crack open,
and since we cannot change our default Wi-Fi account passwords, anyone can steal our Wi-Fi
slots from us.
Step 2: Getting the right facts.
Teams need to collect critical information related to the problem, and the team needs to talk to the right people
who can provide relevant facts and insights. What are you going to use, survey, questionnaire, or interview?
Attach the files you used.
Figure 2. Visual Mapping shows the root and the branching problems
Step 4: Statement of the Problem. When the team has identified the root causes of the
problem, reframe the problem by writing it in the form of a question.
1. What are the negative effects of the vulnerability of FEUR’s NetSuite and Wi-Fi
passwords?
2. How can the school system deal with the hacking activities present?
3. How can this proposed project assure students on the security of their personal data?
Step 1: Brainstorming. The team begins looking for solutions by brainstorming all the possible ideas that
need to be considered, discussed, and evaluated.
Step 2: Record all the ideas in the logbook.
Step 3: Ensure all team members understand each of the possible solutions, before beginning to discuss,
debate, and decide on the best ideas.
1.
2.
3.
Step 1: Weigh all the ideas and select the BEST solution/s
Step 2: Discuss the PROS and CONS
Step 3: Identify criteria. Define the limits or boundaries the team must work within by developing criteria
to increase the quality of the final decision.
● The team needs to judge each solution against the criteria. In other words, “How well
does each solution meet the criteria?”
● The team needs to come to an agreement on the best solution.
4
14%
5
68%
1 2 3 4 5
3
38%
4
39%
1 2 3 4 5
4
42%
3
36%
1 2 3 4 5
2
3 29%
35%
1 2 3 4 5
No
27%
Yes
73%
Yes No
Yes
45%
No
55%
Yes No
Hacker at fault
15%
Uneasy feeling
None 5%
55% Weak security system
9%
No
23%
Yes
77%
Yes No
Yes
No 48%
52%
Yes No
Hire Professionals
2% Use other applications
Use VPN 2%
2%
Note: Write down here all the members’ assigned tasks, duties, or contributions in the process of
doing the project.
Listed below are the unique efforts of each member of the team:
Professor Ditas