Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: CYBER SECURITY INFORMATION TECHNOLOGY CYBER SECURITY INFORMATION TECHNOLOGY Name of the Student: Name of the University: Author’s Note:
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1CYBER SECURITY INFORMATION TECHNOLOGY Mr. Pablos Holman is describing more than a few types of a hacking incident in this video (TEDx Talks 2012). The report reader is describing this cyber-attack which are occurred through the credit card. What is the vulnerability being exploited? Credit card is an essential thing for every human life. With the help of a credit card, people can withdraw a specified amount of money at any time. The credit card user name and password should be secure for user financial safety. However, the hacker quickly hacked this credit card password and collected a massive amount of money by using the RFID chip video (TEDx Talks 2012). This video also seen Mr. Pablo quickly identify other credit details through identity theft. What information or data can be gained by a hacker exploiting this vulnerability? With the help of this credit card cybercrime, the hackers quickly gained credit card details as well as banking information. After identifying this information, the hacker easily steals a massive amount of money in a few times. In recent time, credit card hacking is very much vulnerable and standard attack among the people. How is the hack performed? The cyber attackers are hacking this in several ways. A usual technique of stealing people credit card evidence online is over an information breach. These are when cyber attackers gain access to an industry's processor system, which permits them to observe and download all types of documents, counting their consumers' Social Safety numbers, names, location and banking card information.
2CYBER SECURITY INFORMATION TECHNOLOGY Identity theft includes someone imagining to be user and using their credit card to create acquisitions for themselves (Gupta and Mata-Toledo 2016). These can occur in a variety of situations, counting theft a credit card that was directed to a user in the mail, applying for a card under their name, or only using a card they have lost. What about this particular hack interested you specifically? In the current time, this particular hacking is very much prevalent. The cyber attackers have hacked this process in a different way. This report writer believes that this cyber-attack is unfortunate for the victims, but the hacker's technical skills are very much appreciating for some instance. The report writer wants to evolve these skills and want to implement this in a legal field for the human benefit. That is the reason the writer interested in this attack. How do you think this particular hack could be mitigated? Credit card cyber theft is very much serious concern for the human being. Each person should follow some basic guidelines to mitigate this risk effectively (Shindeet al.2016). In this report mention this way in a point-wise. A person should regulate their banking information card such as Credit. Keep their evidence Safe. Protected user’s online information. Generate Strong Passwords and upgrade it in a weekly or monthly basis. Register Help to Defend their Information. If the people are following these upper mention guidelines then they quickly mitigate this hack.
3CYBER SECURITY INFORMATION TECHNOLOGY References:- Gupta, P. and Mata-Toledo, R.A., 2016. CYBERCRIME: IN DISGUISE CRIMES.Journal of Information Systems & Operations Management,10(1). Shinde, R., Van der Veeken, P., Van Schooten, S. and van den Berg, J., 2016, December. Ransomware: Studying transfer and mitigation. In2016 International Conference on Computing, Analytics and Security Trends (CAST)(pp. 90-95). IEEE. TEDx Talks (August 30, 2012)Top hacker shows us how it's done | Pablos Holman | TEDxMidwest.Availableat:https://www.youtube.com/watch? v=hqKafI7Amd8&feature=youtube (Accessed: 13 April 2020)