This document discusses vulnerabilities in the digital system and their exploitation. It covers different ways hackers can hack personal information and valuable data. It also explores mitigation strategies.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: VULNERABILITIES IN THE DIGITAL SYSTEM Vulnerabilities in the digital system Name of the Student: Name of the University: Author Note:
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1VULNERABILITIES IN THE DIGITAL SYSTEM Answer to the question no a: Vulnerabilities and its exploitation: The vulnerabilities are the potential threats for the computer system and the other digital device used in the organization or used by the individuals. The vulnerabilities can harm the hardware or software of the system. Apart from that, the breaching of the data for the organization and the individuals can occur through this threats or vulnerabilities which is not desirable for both the organization and the individuals (Chenet al.2016). The breaching of the data can be happened in various ways like password spoofing, attacks on the credit or debit card transactions through the generation of the attacks in SSL level. The systems can be exploited and the vulnerabilities can be raised through the loopholes in the system. Apart from that the unawareness of the users can lead to the vulnerabilities in the system. Answer to the question no b: Through the exploitation of the vulnerability, the hacker can hack the data regarding the personal information of the users. Apart from that the valuable information of the organization can be hacked. It has been seen that hacking the personal devices of the individuals help the hacker to get the information of the individuals about their movements and online activities of the users. This will help to increase the security threats for the individuals. In the TedX show it has been seen that the author has successfully hacking the differentdevicesfromtheremotelocation.Fromcollectingtheinformationofthe individuals through the hacking of the devices, the data and the information can be exploited against the users. This can become a security treat from them. Apart from that, it has been seen that the security system imposed on the credit card transaction is not secured. The speaker in TedX shows that the information regarding the card owner and the other important information required for the transaction are exposed.
2VULNERABILITIES IN THE DIGITAL SYSTEM Answer to the question no c: The hacking can be performed in various ways. It has been seen that the speaker in the TedX has invented a bot that will hack the open wifi and will inform the owners of system using that open wifi about their password (Yoo and Shon 2016). Apart from that, another way of hacking is password spoofing. The spoofing of the password will help the hackers to get access of the password through the implementation of code. Apart from that it has been seen that the social media account can be hacked and the activity of the other users can be manipulated using a piece of code. Answer to the question no d: The hacking of the credit card is that think that seems interesting from the discussion. It has been seen that the speaker uses a system to read the data of the credit card.The information from the credit card contains the name of the card owner and the security number of the card. Apart from that the password spoofing is another technique of the entering in to the system (Holman 2019). The spoofing of the password can be done through implementing the malicious code into the system (Hossain, Fotouhi and Hasan 2015). The password spoofing is related to the keyboard spoofing where the system implemented by the intruders can detect the keys the users are pressing. From this pattern they are able to get the password for the system. Answer to the question no e: Mitigation of the particular hack: The risk regarding the credit card can be mitigated through the awareness of the users. The users of the credit card think that their card is secured enough to prevent any kind of vulnerabilities. However, it has been proven wrong. On the other hand the password spoofing can be mitigated through the use of the secured equipment.
3VULNERABILITIES IN THE DIGITAL SYSTEM References Chen, M., Qian, Y., Mao, S., Tang, W. and Yang, X., 2016. Software-defined mobile networks security.Mobile Networks and Applications,21(5), pp.729-743. Holman, P. (2019).Top hacker shows us how it's done | Pablos Holman | TEDxMidwest. [online] YouTube. Available at: https://www.youtube.com/watch?v=hqKafI7Amd8&vl=en [Accessed 11 Apr. 2019]. Hossain, M.M., Fotouhi, M. and Hasan, R., 2015, June. Towards an analysis of security issues, challenges, and open problems in the internet of things. In2015 IEEE World Congress on Services(pp. 21-28). IEEE. Yoo, H. and Shon, T., 2016. Challenges and research directions for heterogeneous cyber– physical system based on IEC 61850: Vulnerabilities, security requirements, and security architecture.Future generation computer systems,61, pp.128-136.