You are on page 1of 10

FEU ROOSEVELT MARIKINA

Tertiary Education Division

FEUR Journey 2 – Critical Thinking, Creativity & Flexibility (FEUR122)


Final Project Guidelines/Template

FEUR NetSuite and Wi-Fi Exploit

Brief Description
The project reveals the vulnerabilities in the system of FEU Roosevelt. It also
demonstrates the possibility of a data breach and how a breach of the personal information of the
students can be prevented. It is based on Digital Sustainability where the researchers aim to
educate their peers about potential hacking activities and how it affects their data privacy. It also
aims to tighten the existing security measures of FEU Roosevelt’s NetSuite and Wi-Fi system.

Goals of the Final Project


1. To give awareness to the vulnerabilities in the system of FEU Roosevelt.
2. To promote a safe and secured school data privacy.
3. To solve the vulnerabilities demonstrated in the problem investigation phase.
4. To help reduce the risk of losses due to cyber-attacks by the hackers which include monetary
loss, reputation loss, data loss, and more to the FEU Roosevelt's Information system.

Stage 1: Identifying the Problems (Investigation Phase)

Step 1: What are the root causes?

Based on our careful observation, (1) the default passwords of FEU Roosevelt’s NetSuite
and Wi-Fi system have an easily crackable pattern. If you want to gain unauthorized access to
a student’s NetSuite account or steal their Wi-Fi account, all you need is their student number
and their surname. Unfortunately, (2) Microsoft Outlook has a loophole that can expose
anyone’s student number along with their surname. Presumably, anyone who has not yet
changed their default NetSuite passwords has their account ready for anyone to crack open,
and since we cannot change our default Wi-Fi account passwords, anyone can steal our Wi-Fi
slots from us.
Step 2: Getting the right facts.
Teams need to collect critical information related to the problem, and the team needs to talk to the right people
who can provide relevant facts and insights. What are you going to use, survey, questionnaire, or interview?
Attach the files you used.

Figure 1. The questionnaire we used for the investigation phase.

Step 3: Visually map the problem.


Teams create these visuals to help people see the varied factors, and interconnections between factors, that
maintain the problem. Show your visual mapping here after the surveys, questionnaires or interviews are done.

Figure 2. Visual Mapping shows the root and the branching problems
Step 4: Statement of the Problem. When the team has identified the root causes of the
problem, reframe the problem by writing it in the form of a question.
1. What are the negative effects of the vulnerability of FEUR’s NetSuite and Wi-Fi
passwords?
2. How can the school system deal with the hacking activities present?
3. How can this proposed project assure students on the security of their personal data?

Stage 2: Looking for Possible Solutions

Step 1: Brainstorming. The team begins looking for solutions by brainstorming all the possible ideas that
need to be considered, discussed, and evaluated.
Step 2: Record all the ideas in the logbook.
Step 3: Ensure all team members understand each of the possible solutions, before beginning to discuss,
debate, and decide on the best ideas.

**Add your ideas here with your name (brainstorming):

1.

2.

3.

Stage 3: Selecting Solutions (Based on the SDGs)

Step 1: Weigh all the ideas and select the BEST solution/s
Step 2: Discuss the PROS and CONS
Step 3: Identify criteria. Define the limits or boundaries the team must work within by developing criteria
to increase the quality of the final decision.
● The team needs to judge each solution against the criteria. In other words, “How well
does each solution meet the criteria?”
● The team needs to come to an agreement on the best solution.

● The team should discuss the following questions at this point:


o What are the risks with this solution?
o What are the opportunities with this solution?

Stage 4: Acting on Solutions: Develop an ACTION PLAN through a creative Chart.


o What steps need to be taken (What)
o Who is responsible for taking the action (Who)
o When each action step needs to be taken (When)
Final task: Come up with an e-poster or infographics to promote your Final Project.
(DRAFT ONLY)

How concerned are you regarding your personal in-


formation?
Figure 1.1. Survey Result Question 1 (Responses: 100)
1 2
2% 1%
3
15%

4
14%

5
68%

1 2 3 4 5

Figure 1.2. Survey Result Question 2 (Responses: 100)


How sure are you that your personal information is safe
with the current FEU Roosevelt school system?
1 2
5 1% 7%
15%

3
38%

4
39%

1 2 3 4 5

How much do you trust the FEU Roosevelt school system


to protect
Figure 1.3. Survey Result Question your personal
3 (Responses: 100) data?
5 1
3% 7%
2
12%

4
42%

3
36%

1 2 3 4 5

Figure 1.4. Survey Result Question 4 (Responses: 100)


How knowledgeable are you about the hacking activities
in FEU Roosevelt?
5
7% 1
4 18%
11%

2
3 29%
35%

1 2 3 4 5

Do you think that your personal information is secured


enough
Figure 2.1. Survey from hackers
Result Question and 100)
1 (Responses: suspicious individuals?

No
27%

Yes
73%

Yes No

Figure 2.2. Survey Result Question 2 (Responses: 100)


Do you have any suspicious feeling that anyone can
access your personal information?

Yes
45%

No
55%

Yes No

If the answer is no, state your reason/s.


Figure 2.2. Survey Result Question 2 (Responses: 55)
Not related answer
13%

Hacker at fault
15%

Uneasy feeling
None 5%
55% Weak security system
9%

No knowledge in data se-


curity
4%

Not related answer Hacker at fault Uneasy feeling


Weak security system No knowledge in data security None

Figure 2.3.1. Survey Result Question 3


Have you experience difiiculties logging in to your
account in FEUR Wi-Fi?

No
23%

Yes
77%

Yes No

Have you experience difiiculties logging in to your


account
Figure 2.3.2. Survey Result Question in NetSuite
4 (Responses: 100)Account?

Yes
No 48%
52%

Yes No

Figure 3.1. Survey Result Question 1 (Responses: 100)


What can you suggest to strengthen and improve the
security of your personal information?
Protect the privacy
11%

Innovate the security system


20%

Change the password


6% None
57%

Hire Professionals
2% Use other applications
Use VPN 2%
2%

None Use other application Use VPN


Hire Professionals Change the password Innovate the security system
Protect the privacy

Note: Write down here all the members’ assigned tasks, duties, or contributions in the process of
doing the project.

Listed below are the unique efforts of each member of the team:

1. Albert Oro Asico


a. Brought laptop for document editing.
2. Alessandra Lei Besmonte
a. Made the Google Forms for survey.
3. Karl Oliveros
a. Discovered the exploit and proposed it to the group.
b. Tallied the surveys filled up on-site.
c. Designed and made the Infographic.
4. Chelsa Janise Sanut
a. Made the PowerPoint
b. Volunteered to be the test subject for the NetSuite exploit.
5. Leeanne Salvador
a. Checked if FEU Main uses the same system.
6. Cyrene Jocson Taguiam
a. Designed and made the visual mapping graphic.
b. Compiled and made the initial version of this document.
7. Andrea Tomas
a. Interpreted the survey results into graphs.
b. Compiled the questions into a survey form.
+==============================+
|| CURSOR PARKING LOT :)) ||
|| ||
|| ||
|| ||
|| ||
+==============================+

Good luck, everyone!

Professor Ditas

You might also like