Loading...

Messages

Proposals

Stuck in your homework and missing deadline? Get urgent help in $10/Page with 24 hours deadline

Get Urgent Writing Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework & Achieve A+ Grades.

Privacy Guaranteed - 100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

Agent surefire

29/12/2020 Client: saad24vbs Deadline: 2 Day

1



ISE 510 Security Risk Analysis & Plan


Week 3 HW 3-1 Video Game: Agent Surefire: InfoSec


30 points



<Last Name, First Name>


Due <DATE>


Submitted on <DATE>


If late let me know why:


=====================================


Delete these instructions in blue font before submission:


Change file name to HW#3_LAST_FIRST


A few comments up front:


-- The GAME instructions say to FIND the MOLE - - but you don't have too -- you just need to correctly categorize and document 7 vulnerabilities.


-- It takes about 45 minutes to 90 minutes.


-- The original purpose of this game play is to discover vulnerabilities that you can use for your final project. However, because the Game is very challenging, you will be provided a more definitive breach description.


-- You might want to watch this quick video, as an exciting introduction, before you start:


https://www.youtube.com/watch?v=x9vsofVgm5I


-- It is highly recommended that you read the Help Menu, once inside the game, for more details.






After navigating to the Jones and Bartlett Learning website that accompanies ISE 510, please start the GAME: Agent SureFire. Use the HELP feature to learn about the objective of the GAME and how to navigate and collect points for uncovering vulnerabilities.


After that, please write down a few sentences about each of the 7 (minimum) vulnerabilities. There are 10 Vulnerably Categorifies, see Appendix for a full list. Questions 3, 7 and 9 are mandatory; otherwise you can stop after completing 7 . Completing 7 vulnerabilities equals 100% score for this HW activity – you are welcome to do more than 7. If you have questions, please don’t hesitate to ask!


1) (vulnerability category #1). Cabinet and drawers left unlocked and/or their keys unsecured (even if they are empty). What example of this vulnerability category did you find?


2) (vulnerability category #2). Documents and media containing business information left unconcealed and/or unsecured.


What example of this vulnerability category did you find?



3) (Mandatory - vulnerability category #3). Documents or media with employee, client or partner information left unconcealed and unsecured.


What example of this vulnerability category did you find?


Give details: Which workstation did you find it? Can you identify the person the desk belongs to? What could be done to prevent this?



4) (vulnerability category #4). Improper disposal of documents containing sensitive information.


What example of this vulnerability category did you find?




5) (vulnerability category #5). Leaving the computer terminals or password-protected software running and unlocked.


What example of this vulnerability category did you find?



6) (vulnerability category #6). Leaving password protected software and running and unlocked


What example of this vulnerability category did you find?


7) (Mandatory - vulnerability category #7). Unconcealed PIN numbers and passwords


What example of this vulnerability category did you find?


Give details: Which workstation did you find it? Can you identify the person the desk belongs to? What could be done to prevent this?


8) (vulnerability category #8). Using predictable PIN numbers to access Voicemail


What example of this vulnerability category did you find?


9) (Mandatory - vulnerability category #9). Portable hardware left unattended, which if stolen would result in material, financial and strategic losses


What example of this vulnerability category did you find?


Give details: Which workstation did you find it? Can you identify the person the desk belongs to? What could be done to prevent this?


10) (vulnerability category #10). Possession and/or use of software and/or storage media that management deems illegal and unsafe.


What example of this vulnerability category did you find?



Appendix - Violation Category from the InfoSec Game




Applied Sciences

Architecture and Design

Biology

Business & Finance

Chemistry

Computer Science

Geography

Geology

Education

Engineering

English

Environmental science

Spanish

Government

History

Human Resource Management

Information Systems

Law

Literature

Mathematics

Nursing

Physics

Political Science

Psychology

Reading

Science

Social Science

Home

Blog

Archive

Contact

google+twitterfacebook

Copyright © 2019 HomeworkMarket.com

Homework is Completed By:

Writer Writer Name Amount Client Comments & Rating
Instant Homework Helper

ONLINE

Instant Homework Helper

$36

She helped me in last minute in a very reasonable price. She is a lifesaver, I got A+ grade in my homework, I will surely hire her again for my next assignments, Thumbs Up!

Order & Get This Solution Within 3 Hours in $25/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 3 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 6 Hours in $20/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 6 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 12 Hours in $15/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 12 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

6 writers have sent their proposals to do this homework:

Helping Hand
Writer Writer Name Offer Chat
Helping Hand

ONLINE

Helping Hand

I am an Academic writer with 10 years of experience. As an Academic writer, my aim is to generate unique content without Plagiarism as per the client’s requirements.

$100 Chat With Writer

Let our expert academic writers to help you in achieving a+ grades in your homework, assignment, quiz or exam.

Similar Homework Questions

Clearing paths to the past by kevin coyne - Why is psychology considered a science - Peeta and katniss first kiss - Software engineering for real time systems jim cooling pdf - AC/FI A3 - Why is foopets not free anymore - Bromination of trans stilbene - Gofree wifi 1 module manual - Secret knock detecting door lock ppt - Investor presentation - Jb hi fi games return policy - Sam weaver proton power - Notes - Ansys maxwell 2d tutorial - Advantages of a multicultural society and labor force - Gym risk assessment pdf - Week 6 Discussion Forum Pathophysiology - Sop for software development - 4 figure grid references worksheet - How to calculate ar - Prismaflex crrt return blood - Roc flx craft beverage trail passport - Distracted Driver Project proposal - Coterminal angle between 0 and 2pi - Mary and kay inc a distributor of cosmetics throughout florida - Stat 200 week 5 homework problems - Holding redlich undergraduate program - 170 ft lbs to nm - American dart association rules - Human Resources Management discussion 2 - Christianity Movie reflection #2 - Apple case study harvard business school - Pin photodiode advantages and disadvantages - Isolation of dna from human cheek cells - Ferrari case study - Accounting Unit 9 - Robert gray harbour dusk analysis - Credit suisse holt lens - Determinants of interest rate for individual securities - Ethical subjectivism - Soc 120 week 2 assignment - A web page designer creates an animation in - Combining nurse leader with advocacy - Cohesive paper - Myshift creative activation com au - Thread 1 - Iso 5817 level d - Rms guide to traffic generating developments - Typed technical presentation - Discussion post - Big five inventory 10 - Illiad inc has decided to raise additional capital by issuing - Why was the leaning tower of pisa originally built - Issues faced by beginning therapists - Australia 842 form 2021 - Adventures in social research 9th edition - How to make a battleship game in python - Quiz 3 Chapter 3: Formulating your brief (10 Questions) - Nbte curriculum for hnd computer science - The research writer van rys pdf - Activity intolerance nursing diagnosis - 2 questions - Each question needs 3 answers - with 1 APA reference for each answer - Each answer atleast 200 words - Matthew 5 43 48 relevance to other worldviews - Large african stork crossword clue - Source Evaluation Utilizing the CRAAP Worksheet - A 32.6 ml sample of hydrogen gas - Eco drive losing time - Joliet 3 minute speech and language screen revised - Make a climate graph - Business Strategy - Argumentative Paper - How can natural selection be modeled virtual lab answers - Organization development and change thomas g cummings pdf - Qm for windows linear programming download - Allegory of the cave essay prompt - Clipsal 5400 battery replacement - Magnesium oxide experiment lab report - Homework AA - Basenji puppies for sale queensland - Democritus birth and death - St leo university newport news va - Bernzomatic st2200t butane micro torch manual - Social blade will tennyson - Approaches to psychology practice worksheet answers - Introduction to Speech - Mass of hollow cylinder - Vitamin a has a molar mass of 286.4 - C4 Due in 24 hours - 5 dysfunctions of a team avoidance of accountability - Community nursing (Due 24 hours) - Need the following 1. Reflection & Discussion post 2. Short essays. These are two seperate assignments with 500 words each. - Testout 4.3 3 connect network devices - Believing game - Goring & woodcote medical practice - Functions and effects of applied social sciences - Philosophy - Elliot perlman and jennifer keyte - Cj hauser wedding - The nine jeffrey toobin summary - How to write a radio script for an advertisement