University Cyber Security Analysis: Credit Card Hacking Mitigation

Verified

Added on  2022/09/21

|4
|725
|22
Homework Assignment
AI Summary
This assignment analyzes a credit card hacking incident discussed in Pablos Holman's TEDxMidwest talk. The student identifies the vulnerability exploited, which involves the use of RFID chips and identity theft to gain access to credit card and banking information. The report details how hackers perform the attack, often through information breaches and identity theft, gaining access to sensitive data. The student expresses interest in the hacker's technical skills and proposes mitigation strategies, including securing banking information, protecting online data, creating strong passwords, and using security services. The assignment provides a comprehensive overview of the cyber security threat, its impact, and potential solutions to safeguard against it.
Document Page
Running head: CYBER SECURITY INFORMATION TECHNOLOGY
CYBER SECURITY INFORMATION TECHNOLOGY
Name of the Student:
Name of the University:
Author’s Note:
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
1CYBER SECURITY INFORMATION TECHNOLOGY
Mr. Pablos Holman is describing more than a few types of a hacking incident in this video
(TEDx Talks 2012). The report reader is describing this cyber-attack which are occurred through
the credit card.
What is the vulnerability being exploited?
Credit card is an essential thing for every human life. With the help of a credit card,
people can withdraw a specified amount of money at any time. The credit card user name and
password should be secure for user financial safety. However, the hacker quickly hacked this
credit card password and collected a massive amount of money by using the RFID chip video
(TEDx Talks 2012). This video also seen Mr. Pablo quickly identify other credit details through
identity theft.
What information or data can be gained by a hacker exploiting this vulnerability?
With the help of this credit card cybercrime, the hackers quickly gained credit card
details as well as banking information. After identifying this information, the hacker easily steals
a massive amount of money in a few times. In recent time, credit card hacking is very much
vulnerable and standard attack among the people.
How is the hack performed?
The cyber attackers are hacking this in several ways. A usual technique of stealing people
credit card evidence online is over an information breach. These are when cyber attackers gain
access to an industry's processor system, which permits them to observe and download all types
of documents, counting their consumers' Social Safety numbers, names, location and banking
card information.
Document Page
2CYBER SECURITY INFORMATION TECHNOLOGY
Identity theft includes someone imagining to be user and using their credit card to create
acquisitions for themselves (Gupta and Mata-Toledo 2016). These can occur in a variety of
situations, counting theft a credit card that was directed to a user in the mail, applying for a card
under their name, or only using a card they have lost.
What about this particular hack interested you specifically?
In the current time, this particular hacking is very much prevalent. The cyber attackers
have hacked this process in a different way. This report writer believes that this cyber-attack is
unfortunate for the victims, but the hacker's technical skills are very much appreciating for some
instance. The report writer wants to evolve these skills and want to implement this in a legal field
for the human benefit. That is the reason the writer interested in this attack.
How do you think this particular hack could be mitigated?
Credit card cyber theft is very much serious concern for the human being. Each person
should follow some basic guidelines to mitigate this risk effectively (Shinde et al. 2016). In this
report mention this way in a point-wise.
A person should regulate their banking information card such as Credit.
Keep their evidence Safe.
Protected user’s online information.
Generate Strong Passwords and upgrade it in a weekly or monthly basis.
Register Help to Defend their Information.
If the people are following these upper mention guidelines then they quickly mitigate this hack.
Document Page
3CYBER SECURITY INFORMATION TECHNOLOGY
References:-
Gupta, P. and Mata-Toledo, R.A., 2016. CYBERCRIME: IN DISGUISE CRIMES. Journal of
Information Systems & Operations Management, 10(1).
Shinde, R., Van der Veeken, P., Van Schooten, S. and van den Berg, J., 2016, December.
Ransomware: Studying transfer and mitigation. In 2016 International Conference on Computing,
Analytics and Security Trends (CAST) (pp. 90-95). IEEE.
TEDx Talks (August 30, 2012) Top hacker shows us how it's done | Pablos Holman |
TEDxMidwest. Available at: https://www.youtube.com/watch?
v=hqKafI7Amd8&feature=youtube (Accessed: 13 April 2020)
chevron_up_icon
1 out of 4
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]