short comment

Anonymous

Question Description

please read the two posts in the attached file and write a short personal comment on each one

Unformatted Attachment Preview

1 )Hackers Were Able To Create A ‘Master Key’ To Unlock Millions Of Hotel Room Doors Recently, two hackers were able to find a vulnerability in the Vision software of the electronic hotel room access keys of VingCard Elsafe, the company that supplies hotel locking systems worldwide. Individuals copying hotel room keys and swipe cards is not a new plight for hotel owners and managers, however, the particular flaw that was identified allowed these hackers to produce a key that was able to open the doors of each room in the entire hotel building. They simply needed access to one of the hotel’s electronic keys and a small hardware device, which is relatively inexpensive to purchase online, to duplicate the exact reading of the key. A master key to the building can be built in minutes. Cybersecurity professionals have expressed the difficulty of building a secure access system as the ones that hotel room access keys require. However, they have been able to identify the shortcomings of the software and build a more secure design that should prevent instances like the duplication of keys from happening again. Additionally, software vulnerabilities like that can also be exploited to gain access to sensitive and personal information of customers. So, the revision of the software has been able to contribute to larger security in the hospitality industry. Many other industries use swipe access cards to gain entry to areas that are confidential and prohibited by some. This is a call to action for all software providers to ensure that their products are secure and up to date for their consumers. Tannam, E. (2018, April 25). Hackers create ‘master key’ that unlocks millions of hotel room doors. Retrieved April 26, 2018 from https://www.siliconrepublic.com/enterprise/hotel-room-keys-hack 2 )Apple Struggling Even which so much intelligence in the company structure of Apple they are still struggling with some security problems. Solving these security issue will cost the company ample time and money to fully fix. Don A Bailey , Founder of Lab mouse security found the issue of , " a hack that, whilst not catastrophic, exploits iOS devices' trust in Internet of Things devices like connected toasters and TVs"(FoxBrewster 2018). This is said to basically turn Apples own Keys into Skeleton Keys. This hack would require penetration into the Internet of things. This hack may not be as hard as it seems as most iot devices have an abundance of vulnerabilities. This is all made possible because of a MFi chip. This chip allows other manufactures access to connect to ios devices. Bailey has discovered that , " iOS devices can be tricked into handing over private network keys to hacked devices that contain such chips"(Fox-Brewster 2018). These could instantly place hacks on home wifi networks. To me this is scary. As technology progresses I feel that the security of them must also progress at a rapid rate. Apple is know for its ability to make its devices secure. Which is why this is so eye opening to me because they do not yet have this problem solved. It will be interesting to see how they front this issue as I am sure they know it has other consumers scared as well. Home wifi is very important. No one wants their wifi that is payed for and other networks hacked at the click of a button . Iot technology is remarkable I am excited to see what the future holds. https://www.forbes.com/sites/thomasbrewster/2018/04/26/skeleton-key-exploitsapple-mfi-trust/#22949fb1503c ...
Purchase answer to see full attachment

Tutor Answer

Dr_Ralph
School: Cornell University

...

flag Report DMCA
Review

Anonymous
Thank you! Reasonably priced given the quality not just of the tutors but the moderators too. They were helpful and accommodating given my needs.

Similar Questions
Related Tags

Brown University





1271 Tutors

California Institute of Technology




2131 Tutors

Carnegie Mellon University




982 Tutors

Columbia University





1256 Tutors

Dartmouth University





2113 Tutors

Emory University





2279 Tutors

Harvard University





599 Tutors

Massachusetts Institute of Technology



2319 Tutors

New York University





1645 Tutors

Notre Dam University





1911 Tutors

Oklahoma University





2122 Tutors

Pennsylvania State University





932 Tutors

Princeton University





1211 Tutors

Stanford University





983 Tutors

University of California





1282 Tutors

Oxford University





123 Tutors

Yale University





2325 Tutors