Loading...

Messages

Proposals

Stuck in your homework and missing deadline? Get urgent help in $10/Page with 24 hours deadline

Get Urgent Writing Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework & Achieve A+ Grades.

Privacy Guaranteed - 100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

Agent surefire

29/12/2020 Client: saad24vbs Deadline: 2 Day

1



ISE 510 Security Risk Analysis & Plan


Week 3 HW 3-1 Video Game: Agent Surefire: InfoSec


30 points



<Last Name, First Name>


Due <DATE>


Submitted on <DATE>


If late let me know why:


=====================================


Delete these instructions in blue font before submission:


Change file name to HW#3_LAST_FIRST


A few comments up front:


-- The GAME instructions say to FIND the MOLE - - but you don't have too -- you just need to correctly categorize and document 7 vulnerabilities.


-- It takes about 45 minutes to 90 minutes.


-- The original purpose of this game play is to discover vulnerabilities that you can use for your final project. However, because the Game is very challenging, you will be provided a more definitive breach description.


-- You might want to watch this quick video, as an exciting introduction, before you start:


https://www.youtube.com/watch?v=x9vsofVgm5I


-- It is highly recommended that you read the Help Menu, once inside the game, for more details.






After navigating to the Jones and Bartlett Learning website that accompanies ISE 510, please start the GAME: Agent SureFire. Use the HELP feature to learn about the objective of the GAME and how to navigate and collect points for uncovering vulnerabilities.


After that, please write down a few sentences about each of the 7 (minimum) vulnerabilities. There are 10 Vulnerably Categorifies, see Appendix for a full list. Questions 3, 7 and 9 are mandatory; otherwise you can stop after completing 7 . Completing 7 vulnerabilities equals 100% score for this HW activity – you are welcome to do more than 7. If you have questions, please don’t hesitate to ask!


1) (vulnerability category #1). Cabinet and drawers left unlocked and/or their keys unsecured (even if they are empty). What example of this vulnerability category did you find?


2) (vulnerability category #2). Documents and media containing business information left unconcealed and/or unsecured.


What example of this vulnerability category did you find?



3) (Mandatory - vulnerability category #3). Documents or media with employee, client or partner information left unconcealed and unsecured.


What example of this vulnerability category did you find?


Give details: Which workstation did you find it? Can you identify the person the desk belongs to? What could be done to prevent this?



4) (vulnerability category #4). Improper disposal of documents containing sensitive information.


What example of this vulnerability category did you find?




5) (vulnerability category #5). Leaving the computer terminals or password-protected software running and unlocked.


What example of this vulnerability category did you find?



6) (vulnerability category #6). Leaving password protected software and running and unlocked


What example of this vulnerability category did you find?


7) (Mandatory - vulnerability category #7). Unconcealed PIN numbers and passwords


What example of this vulnerability category did you find?


Give details: Which workstation did you find it? Can you identify the person the desk belongs to? What could be done to prevent this?


8) (vulnerability category #8). Using predictable PIN numbers to access Voicemail


What example of this vulnerability category did you find?


9) (Mandatory - vulnerability category #9). Portable hardware left unattended, which if stolen would result in material, financial and strategic losses


What example of this vulnerability category did you find?


Give details: Which workstation did you find it? Can you identify the person the desk belongs to? What could be done to prevent this?


10) (vulnerability category #10). Possession and/or use of software and/or storage media that management deems illegal and unsafe.


What example of this vulnerability category did you find?



Appendix - Violation Category from the InfoSec Game




Applied Sciences

Architecture and Design

Biology

Business & Finance

Chemistry

Computer Science

Geography

Geology

Education

Engineering

English

Environmental science

Spanish

Government

History

Human Resource Management

Information Systems

Law

Literature

Mathematics

Nursing

Physics

Political Science

Psychology

Reading

Science

Social Science

Home

Blog

Archive

Contact

google+twitterfacebook

Copyright © 2019 HomeworkMarket.com

Homework is Completed By:

Writer Writer Name Amount Client Comments & Rating
Instant Homework Helper

ONLINE

Instant Homework Helper

$36

She helped me in last minute in a very reasonable price. She is a lifesaver, I got A+ grade in my homework, I will surely hire her again for my next assignments, Thumbs Up!

Order & Get This Solution Within 3 Hours in $25/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 3 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 6 Hours in $20/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 6 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 12 Hours in $15/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 12 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

6 writers have sent their proposals to do this homework:

Helping Hand
Writer Writer Name Offer Chat
Helping Hand

ONLINE

Helping Hand

I am an Academic writer with 10 years of experience. As an Academic writer, my aim is to generate unique content without Plagiarism as per the client’s requirements.

$100 Chat With Writer

Let our expert academic writers to help you in achieving a+ grades in your homework, assignment, quiz or exam.

Similar Homework Questions

The story factory production company - Career support programme claim form - What are the 46 books of the old testament - Minimum number of coins to make change dynamic programming - Sociological Imagination - Tiberian baptist church queens ny - Paper 9 for Jennifer - Why schools should allow phones - Nurse as knowledge worker infographic - The tale of the eloquent peasant sparknotes - Is social business working out - What is the spring constant of the silk thread - Jeumont schneider track circuit manual - Berger kathleen s the developing person - Canon macro lens for dental photography - Governance and sustainability at nike - Qianlong on chinese trade with england - Which one of the following statements concerning the balance sheet is correct? - Member's mark villatic hardtop gazebo - The modern scholar series - Aldi green action eucalyptus oil multi-purpose cleaner - Clippy ts wellington point - How does diversification and acquisition create value for a company - How much is 400f in celsius - Final research proposal - Impression techniques in fixed prosthodontics ppt - Paper of finance - Letter to tenants regarding rubbish - Structuralism vs culturalism - Timon penn and teller revealed - Michael kors marketing plan - Remarks at the brandenburg gate analysis - Advocate role in social work - Minutely ground substance crossword 6 letters - Week 8 - Minimum time an nhs fire door will contain fire - Density of rational numbers - Medicare australia ebusiness service centre - Assessment - Achieve More with Help for Your Writink Services - Preoperative carbohydrate loading in diabetic patients - The far away brothers pdf - How to input chinese characters in windows 7 - Sun protection policy child care - The jeaning of america summary - A specimen of aluminum having a rectangular - 3 quick discussion questions with 3 student responses - Technology and Citizen Participation - My antonia literary analysis essay - Module 1_DisasterRecovery - Leading international fashion houses - Aacc custom art of public speaking - Crisis payment for extreme circumstances - Bus 303 week 2 quiz - Lishman unit maudsley hospital - Margaret o'donnell blackrock clinic - Soap note for shortness of breath - Ebrary berkeley - In a study of government financial aid - What does the name christian mean - 8 cadna avenue felixstow - Topic 2: Population and Sampling Distributions - Physics vce cheat sheet - Capsim capstone cheats - 4/101 melville road brunswick west - West coast transit case study - Discussion question - Make a presentation ( slides) on inner product space - Steps of test construction in psychology - Threaded 2 - Crossing brooklyn ferry transcendentalism - The tempest and the new world - Melting ice physical or chemical - St elizabeth's ward mater hospital - Aoa aon project management - Maersk and hr management challenges in china case study - Touch of pink mary kay - Lab 8 ideal gas law answers - Ielts simon com ielts speaking - Why doesn't sand dissolve in water - Art labeling activity tactile receptors in the skin - Him department vision statement - 30 powerful visualization practices pdf - 2 nile place kearns - Budgeting in nursing management - Mcdonalds organisational culture case study - How to find holes in a graph - How to know charges of transition metals - How to find vertex from focus and directrix - I joist framing details - Imco end mills speeds and feeds - Dyce primary school staff - Article summary - Hrmt - Internal Assessment Survey 04 - Cationic vs anionic emulsion - Mechanism of preparation of m nitrobenzoic acid from methyl benzoate - Goldberg methods of real analysis pdf - Week 6 - Darvall v north sydney brick