logo

Vulnerabilities in the Digital System

   

Added on  2023-01-19

4 Pages909 Words78 Views
Running head: VULNERABILITIES IN THE DIGITAL SYSTEM
Vulnerabilities in the digital system
Name of the Student:
Name of the University:
Author Note:

1VULNERABILITIES IN THE DIGITAL SYSTEM
Answer to the question no a:
Vulnerabilities and its exploitation:
The vulnerabilities are the potential threats for the computer system and the other
digital device used in the organization or used by the individuals. The vulnerabilities can
harm the hardware or software of the system. Apart from that, the breaching of the data for
the organization and the individuals can occur through this threats or vulnerabilities which is
not desirable for both the organization and the individuals (Chen et al. 2016). The breaching
of the data can be happened in various ways like password spoofing, attacks on the credit or
debit card transactions through the generation of the attacks in SSL level. The systems can be
exploited and the vulnerabilities can be raised through the loopholes in the system. Apart
from that the unawareness of the users can lead to the vulnerabilities in the system.
Answer to the question no b:
Through the exploitation of the vulnerability, the hacker can hack the data regarding
the personal information of the users. Apart from that the valuable information of the
organization can be hacked. It has been seen that hacking the personal devices of the
individuals help the hacker to get the information of the individuals about their movements
and online activities of the users. This will help to increase the security threats for the
individuals. In the TedX show it has been seen that the author has successfully hacking the
different devices from the remote location. From collecting the information of the
individuals through the hacking of the devices, the data and the information can be exploited
against the users. This can become a security treat from them. Apart from that, it has been
seen that the security system imposed on the credit card transaction is not secured. The
speaker in TedX shows that the information regarding the card owner and the other important
information required for the transaction are exposed.

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Cyber Security Information Technology Report 2022
|4
|725
|22

Hacking Credit Cards with RFID chip
|5
|819
|443

Cyber Security and Crypto Currency
|4
|741
|25

CPIS 606 Internet Security Auditing Report
|5
|900
|16

Detailed Report on Cyber Security
|5
|917
|216

Hacking and Cybersecurity
|4
|705
|70