1.0.6 Class Activity – Top Hacker Shows Us How It is Done Answers
Class Activity – Top Hacker Shows Us How It is Done (Answers Version)
Answers Note: Red font color or gray highlights indicate text that appears in the instructor copy only.
Objectives
Understand vulnerabilities of wireless and other common technologies
Part 1: View the TEDx Video “Top Hacker Shows Us How It’s Done; Pablos Holman at TEDxMidwests”
Part 2: Answer the following questions
Background / Scenario
Nearly every “secure” system that is used today can be vulnerable to some type of cyberattack.
Required Resources
- PC or mobile device with internet access
Instructions
Part 1: View the TEDx Video “Top Hacker Shows Us How It’s Done; Pablos Holman at TEDxMidwests”
- Locate the video on the internet and watch it.
- Choose one of the hacks discussed by Mr. Holman in the video and use your favorite search engine to conduct some additional research on the hack.
- For the hack chosen in Step 1b, answer the questions below. Be prepared to share your work in a full class discussion.
Part 2: Answer the following questions.
Questions:
- What is the vulnerability being exploited?
Type your answers here.
Answers will vary based on the hack chosen.
- What information, data, or control can be gained by a hacker exploiting this vulnerability?
Type your answers here.
Answers will vary based on the hack chosen.
- How is the hack performed?
Type your answers here.
Answers will vary based on the hack chosen.
- What about this particular hack interested you specifically?
Type your answers here.
Answers will vary based on the hack chosen.
- How do you think this particular hack could be mitigated?
Type your answers here.
Answers will vary based on the hack chosen.