Consider a task that most of us perform every day, the act of purchasing an item with a debit card. A card and a Personal Identification Number (PIN) are used.Identify any potential vulnerabilities in the act of making a purchase with a debit card, and which area of the CIA triad they apply to.