Let’s travel together.

(Answers) 1.0.6 Class Activity – Top Hacker Shows Us How It is Done (Answers)

0

1.0.6 Class Activity – Top Hacker Shows Us How It is Done (Instructor Version)

Instructor Note: Red font color or gray highlights indicate text that appears in the instructor copy only.

Objectives

  • Understand vulnerabilities of wireless and other common technologies
  • Part 1: View the TEDx Video “Top Hacker Shows Us How It’s Done; Pablos Holman at TEDxMidwests”
  • Part 2: Answer the following questions

Background / Scenario

Nearly every “secure” system that is used today can be vulnerable to some type of cyberattack.

Required Resources

  • PC or mobile device with internet access

Instructions

Part 1: View the TEDx Video “Top Hacker Shows Us How It’s Done; Pablos Holman at TEDxMidwests”

a. Locate the video on the internet and watch it.

b. Choose one of the hacks discussed by Mr. Holman in the video and use your favorite search engine to conduct some additional research on the hack.

c. For the hack chosen in Step 1b, answer the questions below. Be prepared to share your work in a full class discussion.

Part 2: Answer the following questions.

a. What is the vulnerability being exploited?

Answers will vary based on the hack chosen.

b. What information, data, or control can be gained by a hacker exploiting this vulnerability?

Answers will vary based on the hack chosen.

c. How is the hack performed?

Answers will vary based on the hack chosen.

d. What about this particular hack interested you specifically?

Answers will vary based on the hack chosen.

e. How do you think this particular hack could be mitigated?

Answers will vary based on the hack chosen.

Download PDF version:

[sociallocker id=”54558″] [wpdm_package id=’58988′][/sociallocker]

5 1 vote
Article Rating
Subscribe
Notify of
guest

0 Comments
Inline Feedbacks
View all comments
0
Would love your thoughts, please comment.x
()
x