Q1) Let a task that most of us perform every day, act of purchasing an item with debit card. A card and a Personal Identification Number (PIN) are used. Recognoze any potential vulnerabilities in making purchase with debit card, and which area of CIA triad they apply to.