Business Finance
short comment

Question Description

please read the two posts in the attached file and write a short personal comment on each one

Unformatted Attachment Preview

1 )Hackers Were Able To Create A ‘Master Key’ To Unlock Millions Of Hotel Room Doors Recently, two hackers were able to find a vulnerability in the Vision software of the electronic hotel room access keys of VingCard Elsafe, the company that supplies hotel locking systems worldwide. Individuals copying hotel room keys and swipe cards is not a new plight for hotel owners and managers, however, the particular flaw that was identified allowed these hackers to produce a key that was able to open the doors of each room in the entire hotel building. They simply needed access to one of the hotel’s electronic keys and a small hardware device, which is relatively inexpensive to purchase online, to duplicate the exact reading of the key. A master key to the building can be built in minutes. Cybersecurity professionals have expressed the difficulty of building a secure access system as the ones that hotel room access keys require. However, they have been able to identify the shortcomings of the software and build a more secure design that should prevent instances like the duplication of keys from happening again. Additionally, software vulnerabilities like that can also be exploited to gain access to sensitive and personal information of customers. So, the revision of the software has been able to contribute to larger security in the hospitality industry. Many other industries use swipe access cards to gain entry to areas that are confidential and prohibited by some. This is a call to action for all software providers to ensure that their products are secure and up to date for their consumers. Tannam, E. (2018, April 25). Hackers create ‘master key’ that unlocks millions of hotel room doors. Retrieved April 26, 2018 from 2 )Apple Struggling Even which so much intelligence in the company structure of Apple they are still struggling with some security problems. Solving these security issue will cost the company ample time and money to fully fix. Don A Bailey , Founder of Lab mouse security found the issue of , " a hack that, whilst not catastrophic, exploits iOS devices' trust in Internet of Things devices like connected toasters and TVs"(FoxBrewster 2018). This is said to basically turn Apples own Keys into Skeleton Keys. This hack would require penetration into the Internet of things. This hack may not be as hard as it seems as most iot devices have an abundance of vulnerabilities. This is all made possible because of a MFi chip. This chip allows other manufactures access to connect to ios devices. Bailey has discovered that , " iOS devices can be tricked into handing over private network keys to hacked devices that contain such chips"(Fox-Brewster 2018). These could instantly place hacks on home wifi networks. To me this is scary. As technology progresses I feel that the security of them must also progress at a rapid rate. Apple is know for its ability to make its devices secure. Which is why this is so eye opening to me because they do not yet have this problem solved. It will be interesting to see how they front this issue as I am sure they know it has other consumers scared as well. Home wifi is very important. No one wants their wifi that is payed for and other networks hacked at the click of a button . Iot technology is remarkable I am excited to see what the future holds. ...
Purchase answer to see full attachment

Final Answer


Dr_Ralph (858)
Cornell University

I was on a very tight deadline but thanks to Studypool I was able to deliver my assignment on time.

The tutor was pretty knowledgeable, efficient and polite. Great service!

Heard about Studypool for a while and finally tried it. Glad I did caus this was really helpful.

Similar Questions
Related Tags

Brown University

1271 Tutors

California Institute of Technology

2131 Tutors

Carnegie Mellon University

982 Tutors

Columbia University

1256 Tutors

Dartmouth University

2113 Tutors

Emory University

2279 Tutors

Harvard University

599 Tutors

Massachusetts Institute of Technology

2319 Tutors

New York University

1645 Tutors

Notre Dam University

1911 Tutors

Oklahoma University

2122 Tutors

Pennsylvania State University

932 Tutors

Princeton University

1211 Tutors

Stanford University

983 Tutors

University of California

1282 Tutors

Oxford University

123 Tutors

Yale University

2325 Tutors