0% found this document useful (0 votes)
10 views

1.0.6 Class Activity - Top Hacker Shows Us How It Is Done

Uploaded by

olumilade
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
10 views

1.0.6 Class Activity - Top Hacker Shows Us How It Is Done

Uploaded by

olumilade
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 1

Class Activity - Top Hacker Shows Us How It is Done

Objectives
Understand vulnerabilities of wireless and other common technologies
Part 1: View the TEDx Video “Top Hacker Shows Us How It’s Done; Pablos Holman at TEDxMidwests”
Part 2: Answer the following questions

Background / Scenario
Nearly every “secure” system that is used today can be vulnerable to some type of cyberattack.

Required Resources
 PC or mobile device with internet access

Instructions

Part 1: View the TEDx Video “Top Hacker Shows Us How It’s Done; Pablos
Holman at TEDxMidwests”
a. Locate the video on the internet and watch it.
b. Choose one of the hacks discussed by Mr. Holman in the video and use your favorite search engine to
conduct some additional research on the hack.
c. For the hack chosen in Step 1b, answer the questions below. Be prepared to share your work in a full
class discussion.

Part 2: Answer the following questions.


Questions:

a. What is the vulnerability being exploited?


Type your answers here.

b. What information, data, or control can be gained by a hacker exploiting this vulnerability?
Type your answers here.

c. How is the hack performed?


Type your answers here.

d. What about this particular hack interested you specifically?


Type your answers here.

e. How do you think this particular hack could be mitigated?


Type your answers here.

End of document

 2017 - 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 1 of 1 www.netacad.com

You might also like