Loading...

Messages

Proposals

Stuck in your homework and missing deadline? Get urgent help in $10/Page with 24 hours deadline

Get Urgent Writing Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework & Achieve A+ Grades.

Privacy Guaranteed - 100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

Agent surefire

29/12/2020 Client: saad24vbs Deadline: 2 Day

1



ISE 510 Security Risk Analysis & Plan


Week 3 HW 3-1 Video Game: Agent Surefire: InfoSec


30 points



<Last Name, First Name>


Due <DATE>


Submitted on <DATE>


If late let me know why:


=====================================


Delete these instructions in blue font before submission:


Change file name to HW#3_LAST_FIRST


A few comments up front:


-- The GAME instructions say to FIND the MOLE - - but you don't have too -- you just need to correctly categorize and document 7 vulnerabilities.


-- It takes about 45 minutes to 90 minutes.


-- The original purpose of this game play is to discover vulnerabilities that you can use for your final project. However, because the Game is very challenging, you will be provided a more definitive breach description.


-- You might want to watch this quick video, as an exciting introduction, before you start:


https://www.youtube.com/watch?v=x9vsofVgm5I


-- It is highly recommended that you read the Help Menu, once inside the game, for more details.






After navigating to the Jones and Bartlett Learning website that accompanies ISE 510, please start the GAME: Agent SureFire. Use the HELP feature to learn about the objective of the GAME and how to navigate and collect points for uncovering vulnerabilities.


After that, please write down a few sentences about each of the 7 (minimum) vulnerabilities. There are 10 Vulnerably Categorifies, see Appendix for a full list. Questions 3, 7 and 9 are mandatory; otherwise you can stop after completing 7 . Completing 7 vulnerabilities equals 100% score for this HW activity – you are welcome to do more than 7. If you have questions, please don’t hesitate to ask!


1) (vulnerability category #1). Cabinet and drawers left unlocked and/or their keys unsecured (even if they are empty). What example of this vulnerability category did you find?


2) (vulnerability category #2). Documents and media containing business information left unconcealed and/or unsecured.


What example of this vulnerability category did you find?



3) (Mandatory - vulnerability category #3). Documents or media with employee, client or partner information left unconcealed and unsecured.


What example of this vulnerability category did you find?


Give details: Which workstation did you find it? Can you identify the person the desk belongs to? What could be done to prevent this?



4) (vulnerability category #4). Improper disposal of documents containing sensitive information.


What example of this vulnerability category did you find?




5) (vulnerability category #5). Leaving the computer terminals or password-protected software running and unlocked.


What example of this vulnerability category did you find?



6) (vulnerability category #6). Leaving password protected software and running and unlocked


What example of this vulnerability category did you find?


7) (Mandatory - vulnerability category #7). Unconcealed PIN numbers and passwords


What example of this vulnerability category did you find?


Give details: Which workstation did you find it? Can you identify the person the desk belongs to? What could be done to prevent this?


8) (vulnerability category #8). Using predictable PIN numbers to access Voicemail


What example of this vulnerability category did you find?


9) (Mandatory - vulnerability category #9). Portable hardware left unattended, which if stolen would result in material, financial and strategic losses


What example of this vulnerability category did you find?


Give details: Which workstation did you find it? Can you identify the person the desk belongs to? What could be done to prevent this?


10) (vulnerability category #10). Possession and/or use of software and/or storage media that management deems illegal and unsafe.


What example of this vulnerability category did you find?



Appendix - Violation Category from the InfoSec Game




Applied Sciences

Architecture and Design

Biology

Business & Finance

Chemistry

Computer Science

Geography

Geology

Education

Engineering

English

Environmental science

Spanish

Government

History

Human Resource Management

Information Systems

Law

Literature

Mathematics

Nursing

Physics

Political Science

Psychology

Reading

Science

Social Science

Home

Blog

Archive

Contact

google+twitterfacebook

Copyright © 2019 HomeworkMarket.com

Homework is Completed By:

Writer Writer Name Amount Client Comments & Rating
Instant Homework Helper

ONLINE

Instant Homework Helper

$36

She helped me in last minute in a very reasonable price. She is a lifesaver, I got A+ grade in my homework, I will surely hire her again for my next assignments, Thumbs Up!

Order & Get This Solution Within 3 Hours in $25/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 3 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 6 Hours in $20/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 6 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 12 Hours in $15/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 12 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

6 writers have sent their proposals to do this homework:

Helping Hand
Writer Writer Name Offer Chat
Helping Hand

ONLINE

Helping Hand

I am an Academic writer with 10 years of experience. As an Academic writer, my aim is to generate unique content without Plagiarism as per the client’s requirements.

$100 Chat With Writer

Let our expert academic writers to help you in achieving a+ grades in your homework, assignment, quiz or exam.

Similar Homework Questions

Windowbuilder netbeans - Inga clendinnen dancing with strangers summary - Global Crime & Justice - Clinical outcomes variable scale - Altman z score calculator for public companies - Cumulative effects theory - Ethics - Discrete math for information technology - 3706 greywood dr raleigh nc - Food dye lab report - Wk 5, IOP/470: Diversity and Groups - Multiple choice questions on mediation - Cyber Law - assignment 1 - Bandeath stray dog shelter dogs looking for homes - Sas system for linear models - Famous athletes with pku - What is coke's vision for globalization - One pole one zero filter - Ditch witch 1030 belt diagram - Consistent and inconsistent systems calculator - Course Paper Prep: Interview Planning Assignments Submit Assignment - Tenants union victoria contact - Scientific advances in supporting wellness - Commonwealth assistance notice deakin - Disability Comparison Template - Massacre at mystic worksheet answers - A1 and a2 size - Concrete slab tolerances in level - Reflection paper - Fields of Practice Assignment - Is a rusty nail metallic or nonmetallic - Hooke's law parallel springs - Is earth overpopulated bbc documentary - Case 8 data analytics of boutique hotel reservations - What does rtn mean in penn foster - Organic Molecules - Integrated Big Data Analytics with their Business Intelligence - Btec business level 3 unit 4 m1 - Athletic shoe once endorsed by paula abdul - Linux implementation proposal - Laurie pike health centre - Nation to australia's north west - Preposition and its types with examples ppt - This egg is surrounded by mysterious reflective dust - Transactions that affect assets liabilities and owner's capital answer key - Report paper - A nurse-manager appropriately behaves as an autocrat in which situation? - Quickbooks final exam answers - 2 discussion question and a one page paper - Saltwater crocodile behavioural adaptations - Swedish fish bulk costco - If ssw = 126, n = 28, k = 4, then what is the value of sw2 - Witchcraft among the azande video - Iroquois county sample ballot 2018 - Napoleon beazley last words - Bill cooper after the flood - Rena vite vs dialyvite - Kristen bell for the first time in forever - The airline project tutorial - Demolition risk assessment and method statement - Two discussions due before 11:59 today - 12 angry men organizational behavior - Barberry inc manufactures a product called fruta - Charles gairdner eye clinic - Shadow health chest pain assessment - Yitang zhang new hampshire - Science Meets Real Life - Settling time first order system - Thick face black heart - Final Research Paper: Leadership and Management topic - Independent project 4 5 excel 2016 - Purpose driven daycare coaling alabama - Vce examination timetable 2021 - Video critique assignment - Walmart employee job satisfaction - Manufacturing statements and cost behavior - Week 7 DQ1 - More zero product law work homework answer key - Truth in the things they carried - Western power self read - Auditors should be familiar with available professional literature - Llanishen court surgery cardiff - Effective leadership and management in nursing sullivan pdf - Air force personal leadership development plan example - Greatest inventions with bill nye engineering and architecture worksheet - Taming the anger monster by anne davidson - Bsbadm502 manage meetings task 1 - Cao dewang net worth - Fct v la rosa - What is a dividend divisor and quotient - Wartsila 46 product guide - Morgan molten metal systems - Multicultural education in a pluralistic society chapter 1 - Famous freedom fighters of the world - Nursing Theory 2.0 - 150 x 50 rhs span table - What is spatial organization in psychology - Statistics chapter 5 practice finding outliers worksheet answers - Basics of information technology ppt - The jilting of granny weatherall character analysis