GTC IST-110 Lab: Common Technology Vulnerabilities
Objectives
Understand vulnerabilities of wireless and other common technologies
Background / Scenario
Nearly every “secure” system that is used today can be vulnerable to some type of cyberattack.
Required Resources
PC or mobile device with Internet access
Part 1:
Review TEDx video
Top Hacker Shows Us How It’s Done; Pablos Holman
1.
Click on the link below and watch the Video.
2.
Top Hacker Shows Us How It’s Done; Pablos Holman at TEDxMidwests
https://youtu.be/hqKafI7Amd8
3.
In the video, Mr. Holman discusses various security vulnerabilities concerning systems that are typically considered as secure, however, as he points out in his presentation, they are all vulnerable to attack.
4.
Choose one of the hacks discussed by Mr. Holman in the video, and using your favorite search engine conduct some additional research on the hack.
5.
For the hack chosen, answer the questions below. Part 2:
Reflection
Based upon your choice (from Part 1): Note: Be descriptive in your responses
6.
What is the vulnerability being exploited?
7.
Give the timestamp (time in the video) in which your topic begins: mm:ss format
~ i.e. 02:59 = 2 minutes 59 seconds
GTC - CPT Dept
Page 1
of 2 IST 110 Lab