Loading...

Messages

Proposals

Stuck in your homework and missing deadline? Get urgent help in $10/Page with 24 hours deadline

Get Urgent Writing Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework & Achieve A+ Grades.

Privacy Guaranteed - 100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

Agent surefire

29/12/2020 Client: saad24vbs Deadline: 2 Day

1



ISE 510 Security Risk Analysis & Plan


Week 3 HW 3-1 Video Game: Agent Surefire: InfoSec


30 points



<Last Name, First Name>


Due <DATE>


Submitted on <DATE>


If late let me know why:


=====================================


Delete these instructions in blue font before submission:


Change file name to HW#3_LAST_FIRST


A few comments up front:


-- The GAME instructions say to FIND the MOLE - - but you don't have too -- you just need to correctly categorize and document 7 vulnerabilities.


-- It takes about 45 minutes to 90 minutes.


-- The original purpose of this game play is to discover vulnerabilities that you can use for your final project. However, because the Game is very challenging, you will be provided a more definitive breach description.


-- You might want to watch this quick video, as an exciting introduction, before you start:


https://www.youtube.com/watch?v=x9vsofVgm5I


-- It is highly recommended that you read the Help Menu, once inside the game, for more details.






After navigating to the Jones and Bartlett Learning website that accompanies ISE 510, please start the GAME: Agent SureFire. Use the HELP feature to learn about the objective of the GAME and how to navigate and collect points for uncovering vulnerabilities.


After that, please write down a few sentences about each of the 7 (minimum) vulnerabilities. There are 10 Vulnerably Categorifies, see Appendix for a full list. Questions 3, 7 and 9 are mandatory; otherwise you can stop after completing 7 . Completing 7 vulnerabilities equals 100% score for this HW activity – you are welcome to do more than 7. If you have questions, please don’t hesitate to ask!


1) (vulnerability category #1). Cabinet and drawers left unlocked and/or their keys unsecured (even if they are empty). What example of this vulnerability category did you find?


2) (vulnerability category #2). Documents and media containing business information left unconcealed and/or unsecured.


What example of this vulnerability category did you find?



3) (Mandatory - vulnerability category #3). Documents or media with employee, client or partner information left unconcealed and unsecured.


What example of this vulnerability category did you find?


Give details: Which workstation did you find it? Can you identify the person the desk belongs to? What could be done to prevent this?



4) (vulnerability category #4). Improper disposal of documents containing sensitive information.


What example of this vulnerability category did you find?




5) (vulnerability category #5). Leaving the computer terminals or password-protected software running and unlocked.


What example of this vulnerability category did you find?



6) (vulnerability category #6). Leaving password protected software and running and unlocked


What example of this vulnerability category did you find?


7) (Mandatory - vulnerability category #7). Unconcealed PIN numbers and passwords


What example of this vulnerability category did you find?


Give details: Which workstation did you find it? Can you identify the person the desk belongs to? What could be done to prevent this?


8) (vulnerability category #8). Using predictable PIN numbers to access Voicemail


What example of this vulnerability category did you find?


9) (Mandatory - vulnerability category #9). Portable hardware left unattended, which if stolen would result in material, financial and strategic losses


What example of this vulnerability category did you find?


Give details: Which workstation did you find it? Can you identify the person the desk belongs to? What could be done to prevent this?


10) (vulnerability category #10). Possession and/or use of software and/or storage media that management deems illegal and unsafe.


What example of this vulnerability category did you find?



Appendix - Violation Category from the InfoSec Game




Applied Sciences

Architecture and Design

Biology

Business & Finance

Chemistry

Computer Science

Geography

Geology

Education

Engineering

English

Environmental science

Spanish

Government

History

Human Resource Management

Information Systems

Law

Literature

Mathematics

Nursing

Physics

Political Science

Psychology

Reading

Science

Social Science

Home

Blog

Archive

Contact

google+twitterfacebook

Copyright © 2019 HomeworkMarket.com

Homework is Completed By:

Writer Writer Name Amount Client Comments & Rating
Instant Homework Helper

ONLINE

Instant Homework Helper

$36

She helped me in last minute in a very reasonable price. She is a lifesaver, I got A+ grade in my homework, I will surely hire her again for my next assignments, Thumbs Up!

Order & Get This Solution Within 3 Hours in $25/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 3 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 6 Hours in $20/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 6 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 12 Hours in $15/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 12 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

6 writers have sent their proposals to do this homework:

Helping Hand
Writer Writer Name Offer Chat
Helping Hand

ONLINE

Helping Hand

I am an Academic writer with 10 years of experience. As an Academic writer, my aim is to generate unique content without Plagiarism as per the client’s requirements.

$100 Chat With Writer

Let our expert academic writers to help you in achieving a+ grades in your homework, assignment, quiz or exam.

Similar Homework Questions

Persuasive speech about social media - Network filters and transmission lines books free download - How to measure 3 phase power - The Nurse Leader as Knowledge Worker - Why are oysters greedy math worksheet answers - Planned vs processual change - An alarm clock draws 0.5 a of current - Characteristics of a parallelogram - The other wes moore full text - Cineplex entertainment the loyalty program pdf - Ucl postgraduate personal statement - Excalibur corporation sells video games - Gatford and phillips nursing calculations - Gat writing task 1 example - The perils of confusing management and leadership - The benefits of music education by laura lewis brown - Problem Set 1 - Assignment 1 lenscrafters case study - Geberit mepla installation guide - +91-8306951337 kala jadu specialist astrologer IN Agartala - I am in a pickle with my course it ends on the 21 but I have a two week grace period I have 5 assignments left. How much would this cost to complete the assignments in this time period - Project management simulation scope resources and schedule solution - Ap physics 2 electrostatics - Ati active learning template basic concept management of care - The power of thinking differently - Dltk teach hungry caterpillar - Discussion: Scarcity and Opportunity Costs - Angels rest animal sanctuary - Asthma australia pj day - Research Methods in Criminal Justice_Chapter 6 - Environmental ethics desjardins 5th edition pdf - Unit 1 Scholarly Activity - Eldon foote norfolk island - Discussion - When the joneses wear jeans - Food as thought resisting the moralization of eating - Pros and cons of being a union steward - Alternatives to swot analysis - Project management conveyor belt project - The primary objective of external financial reporting is - Classify each sample as random systematic stratified or cluster - Sealers cove tide times - Unit 12 internet marketing m1 - Inherent Risk, Tests of Controls, and Substantive Procedures - What is the diameter of mercury - 63 divided by 4 - Define sas in geometry - Sports illustrated media kit demographics - Academic Assessment Assignment - Invacare oxygen concentrator troubleshooting - Siop model lesson plan format - Salt water density tower - Steady state error from graph - Acc ethical framework - Order 2123916: Identify and discuss in a coherent manner some of the ways that Aeneas as a warrior and family man in the Aeneid differs from Hektor in the Iliad. - Covenant counseling and family resource center - Homemade incubator without thermostat - Tracker software pdf xchange pro - Rail safety and standards board limited - Given the following data direct materials used is - Discussion - Solution to mat 144 mission trip assignment details - Sign language courses serc - DOC690 MOD 1 - Anu lss past exams - Gibbs free energy worksheet - One assignment due tomorrow before 11:59 pm - Net operating asset turnover formula - 150-200 Word Discussion - I ate them i ate the divorce papers - Dental photography mirrorless camera - Pilot training sunshine coast - La folie du jour blanchot pdf - Baking soda and vinegar limiting reactant lab answers - Alternative conceptions about living things - Chapter 2 neil simon monologue - Human resource competencies an empirical assessment - Sonnet to a negro in harlem - Change management discussion questions - Different types of historians - Freedoge co in script 2018 - Gradually varied flow direct step method - Too swift arrives as tardy as too slow meaning - Oceanview marine company assignment 6 option a - Discussion - North miami middle school - Example of family genogram with explanation - 1234567891011 find the mistake if you are genius answer - Pestle analysis for escape rooms - Otway national park koalas - Critical Thinking - Pep9 - Linear momentum lab - Research paper about music - How avoid losing money on investments informative speech - Margaret newman health as expanding consciousness pdf - Vcc usb1- usb1+ gnd - No 7 bus milton keynes - Ape genius video - Office 365 troubleshooting steps