IS Auditing: CPIS 606 Assignment on Digital Vulnerabilities

Verified

Added on  2023/01/19

|4
|909
|78
Homework Assignment
AI Summary
This assignment analyzes vulnerabilities in digital systems, focusing on a TEDx talk that highlights various security flaws. The student explores vulnerabilities like password spoofing and credit card hacking, detailing how these exploits work and the potential impact on individuals and organizations. The assignment covers how hackers can gain access to sensitive information and the techniques they employ. Furthermore, it delves into specific hacking methods, such as exploiting open Wi-Fi networks and manipulating social media accounts. The student then discusses the student's interest in credit card hacking, explaining how it's performed and potential mitigation strategies, such as user awareness and the use of secure equipment. The assignment provides a comprehensive overview of digital security threats and potential countermeasures.
Document Page
Running head: VULNERABILITIES IN THE DIGITAL SYSTEM
Vulnerabilities in the digital system
Name of the Student:
Name of the University:
Author Note:
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
1VULNERABILITIES IN THE DIGITAL SYSTEM
Answer to the question no a:
Vulnerabilities and its exploitation:
The vulnerabilities are the potential threats for the computer system and the other
digital device used in the organization or used by the individuals. The vulnerabilities can
harm the hardware or software of the system. Apart from that, the breaching of the data for
the organization and the individuals can occur through this threats or vulnerabilities which is
not desirable for both the organization and the individuals (Chen et al. 2016). The breaching
of the data can be happened in various ways like password spoofing, attacks on the credit or
debit card transactions through the generation of the attacks in SSL level. The systems can be
exploited and the vulnerabilities can be raised through the loopholes in the system. Apart
from that the unawareness of the users can lead to the vulnerabilities in the system.
Answer to the question no b:
Through the exploitation of the vulnerability, the hacker can hack the data regarding
the personal information of the users. Apart from that the valuable information of the
organization can be hacked. It has been seen that hacking the personal devices of the
individuals help the hacker to get the information of the individuals about their movements
and online activities of the users. This will help to increase the security threats for the
individuals. In the TedX show it has been seen that the author has successfully hacking the
different devices from the remote location. From collecting the information of the
individuals through the hacking of the devices, the data and the information can be exploited
against the users. This can become a security treat from them. Apart from that, it has been
seen that the security system imposed on the credit card transaction is not secured. The
speaker in TedX shows that the information regarding the card owner and the other important
information required for the transaction are exposed.
Document Page
2VULNERABILITIES IN THE DIGITAL SYSTEM
Answer to the question no c:
The hacking can be performed in various ways. It has been seen that the speaker in
the TedX has invented a bot that will hack the open wifi and will inform the owners of
system using that open wifi about their password (Yoo and Shon 2016). Apart from that,
another way of hacking is password spoofing. The spoofing of the password will help the
hackers to get access of the password through the implementation of code. Apart from that it
has been seen that the social media account can be hacked and the activity of the other users
can be manipulated using a piece of code.
Answer to the question no d:
The hacking of the credit card is that think that seems interesting from the discussion.
It has been seen that the speaker uses a system to read the data of the credit card. The
information from the credit card contains the name of the card owner and the security number
of the card. Apart from that the password spoofing is another technique of the entering in to
the system (Holman 2019). The spoofing of the password can be done through implementing
the malicious code into the system (Hossain, Fotouhi and Hasan 2015). The password
spoofing is related to the keyboard spoofing where the system implemented by the intruders
can detect the keys the users are pressing. From this pattern they are able to get the password
for the system.
Answer to the question no e:
Mitigation of the particular hack:
The risk regarding the credit card can be mitigated through the awareness of the users.
The users of the credit card think that their card is secured enough to prevent any kind of
vulnerabilities. However, it has been proven wrong. On the other hand the password spoofing
can be mitigated through the use of the secured equipment.
Document Page
3VULNERABILITIES IN THE DIGITAL SYSTEM
References
Chen, M., Qian, Y., Mao, S., Tang, W. and Yang, X., 2016. Software-defined mobile
networks security. Mobile Networks and Applications, 21(5), pp.729-743.
Holman, P. (2019). Top hacker shows us how it's done | Pablos Holman | TEDxMidwest.
[online] YouTube. Available at: https://www.youtube.com/watch?v=hqKafI7Amd8&vl=en
[Accessed 11 Apr. 2019].
Hossain, M.M., Fotouhi, M. and Hasan, R., 2015, June. Towards an analysis of security
issues, challenges, and open problems in the internet of things. In 2015 IEEE World
Congress on Services (pp. 21-28). IEEE.
Yoo, H. and Shon, T., 2016. Challenges and research directions for heterogeneous cyber–
physical system based on IEC 61850: Vulnerabilities, security requirements, and security
architecture. Future generation computer systems, 61, pp.128-136.
chevron_up_icon
1 out of 4
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]