Consider a task that most of us carry out every day, act of purchasing an item through a debit card. A card and the Personal Identification Number (PIN) are used. Recognize any potential vulnerabilities in act of making a purchase through the debit card, and which area of the CIA triad they apply to.