100% found this document useful (1 vote)
212 views1 page

1.0.1.2 Class Activity - Top Hacker Shows Us How It Is Done

This document outlines a class activity where students will: 1) Watch a TED talk video about common technology vulnerabilities demonstrated by a hacker. 2) Research one of the hacks discussed in the video. 3) Answer questions about the vulnerability exploited, what data can be gained, how the hack is performed, what interested them, and how it could be mitigated. The goal is for students to understand common technology vulnerabilities and how cyberattacks can exploit systems considered secure.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
212 views1 page

1.0.1.2 Class Activity - Top Hacker Shows Us How It Is Done

This document outlines a class activity where students will: 1) Watch a TED talk video about common technology vulnerabilities demonstrated by a hacker. 2) Research one of the hacks discussed in the video. 3) Answer questions about the vulnerability exploited, what data can be gained, how the hack is performed, what interested them, and how it could be mitigated. The goal is for students to understand common technology vulnerabilities and how cyberattacks can exploit systems considered secure.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 1

Class Activity – Top Hacker Shows Us How It is Done

Objectives
Understand vulnerabilities of wireless and other common technologies

Background / Scenario
Nearly every “secure” system that is used today can be vulnerable to some type of cyberattack.

Required Resources
 PC or mobile device with Internet access

Step 1: View the TEDx Video “Top Hacker Shows Us How It’s Done; Pablos Holman at
TEDxMidwests”
a. Click on the link below and watch the Video.
Top Hacker Shows Us How It’s Done; Pablos Holman at TEDxMidwests
In the video, Mr. Holman discusses various security vulnerabilities concerning systems that are typically
considered as secure, however, as he points out in his presentation, they are all vulnerable to attack.
b. Choose one of the hacks discussed by Mr. Holman in the video, and using your favorite search engine
conduct some additional research on the hack.
c. For the hack chosen in Step 1b, answer the questions below. Be prepared to share your work in a full
class discussion.

Step 2: Answer the following questions.


a. What is the vulnerability being exploited?
____________________________________________________________________________________
____________________________________________________________________________________
b. What information or data can be gained by a hacker exploiting this vulnerability?
____________________________________________________________________________________
____________________________________________________________________________________
c. How is the hack performed?
____________________________________________________________________________________
____________________________________________________________________________________
d. What about this particular hack interested you specifically?
____________________________________________________________________________________
____________________________________________________________________________________
e. How do you think this particular hack could be mitigated?
____________________________________________________________________________________
____________________________________________________________________________________

 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 1 of 1 www.netacad.com

You might also like