logo

Cyber Security Information Technology Report 2022

   

Added on  2022-09-21

4 Pages725 Words22 Views
Running head: CYBER SECURITY INFORMATION TECHNOLOGY
CYBER SECURITY INFORMATION TECHNOLOGY
Name of the Student:
Name of the University:
Author’s Note:

CYBER SECURITY INFORMATION TECHNOLOGY
1
Mr. Pablos Holman is describing more than a few types of a hacking incident in this video
(TEDx Talks 2012). The report reader is describing this cyber-attack which are occurred through
the credit card.
What is the vulnerability being exploited?
Credit card is an essential thing for every human life. With the help of a credit card,
people can withdraw a specified amount of money at any time. The credit card user name and
password should be secure for user financial safety. However, the hacker quickly hacked this
credit card password and collected a massive amount of money by using the RFID chip video
(TEDx Talks 2012). This video also seen Mr. Pablo quickly identify other credit details through
identity theft.
What information or data can be gained by a hacker exploiting this vulnerability?
With the help of this credit card cybercrime, the hackers quickly gained credit card
details as well as banking information. After identifying this information, the hacker easily steals
a massive amount of money in a few times. In recent time, credit card hacking is very much
vulnerable and standard attack among the people.
How is the hack performed?
The cyber attackers are hacking this in several ways. A usual technique of stealing people
credit card evidence online is over an information breach. These are when cyber attackers gain
access to an industry's processor system, which permits them to observe and download all types
of documents, counting their consumers' Social Safety numbers, names, location and banking
card information.

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Vulnerabilities in the Digital System
|4
|909
|78

Hacking Credit Cards with RFID chip
|5
|819
|443

cyber security threats and attacks
|4
|749
|141

CPIS 606 Internet Security Auditing Report
|5
|900
|16

Computer Crime and Digital Forensic : Report
|15
|3299
|123

JP Morgan Data Breach
|5
|722
|96