Loading...

Messages

Proposals

Stuck in your homework and missing deadline? Get urgent help in $10/Page with 24 hours deadline

Get Urgent Writing Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework & Achieve A+ Grades.

Privacy Guaranteed - 100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

Agent surefire

29/12/2020 Client: saad24vbs Deadline: 2 Day

1



ISE 510 Security Risk Analysis & Plan


Week 3 HW 3-1 Video Game: Agent Surefire: InfoSec


30 points



<Last Name, First Name>


Due <DATE>


Submitted on <DATE>


If late let me know why:


=====================================


Delete these instructions in blue font before submission:


Change file name to HW#3_LAST_FIRST


A few comments up front:


-- The GAME instructions say to FIND the MOLE - - but you don't have too -- you just need to correctly categorize and document 7 vulnerabilities.


-- It takes about 45 minutes to 90 minutes.


-- The original purpose of this game play is to discover vulnerabilities that you can use for your final project. However, because the Game is very challenging, you will be provided a more definitive breach description.


-- You might want to watch this quick video, as an exciting introduction, before you start:


https://www.youtube.com/watch?v=x9vsofVgm5I


-- It is highly recommended that you read the Help Menu, once inside the game, for more details.






After navigating to the Jones and Bartlett Learning website that accompanies ISE 510, please start the GAME: Agent SureFire. Use the HELP feature to learn about the objective of the GAME and how to navigate and collect points for uncovering vulnerabilities.


After that, please write down a few sentences about each of the 7 (minimum) vulnerabilities. There are 10 Vulnerably Categorifies, see Appendix for a full list. Questions 3, 7 and 9 are mandatory; otherwise you can stop after completing 7 . Completing 7 vulnerabilities equals 100% score for this HW activity – you are welcome to do more than 7. If you have questions, please don’t hesitate to ask!


1) (vulnerability category #1). Cabinet and drawers left unlocked and/or their keys unsecured (even if they are empty). What example of this vulnerability category did you find?


2) (vulnerability category #2). Documents and media containing business information left unconcealed and/or unsecured.


What example of this vulnerability category did you find?



3) (Mandatory - vulnerability category #3). Documents or media with employee, client or partner information left unconcealed and unsecured.


What example of this vulnerability category did you find?


Give details: Which workstation did you find it? Can you identify the person the desk belongs to? What could be done to prevent this?



4) (vulnerability category #4). Improper disposal of documents containing sensitive information.


What example of this vulnerability category did you find?




5) (vulnerability category #5). Leaving the computer terminals or password-protected software running and unlocked.


What example of this vulnerability category did you find?



6) (vulnerability category #6). Leaving password protected software and running and unlocked


What example of this vulnerability category did you find?


7) (Mandatory - vulnerability category #7). Unconcealed PIN numbers and passwords


What example of this vulnerability category did you find?


Give details: Which workstation did you find it? Can you identify the person the desk belongs to? What could be done to prevent this?


8) (vulnerability category #8). Using predictable PIN numbers to access Voicemail


What example of this vulnerability category did you find?


9) (Mandatory - vulnerability category #9). Portable hardware left unattended, which if stolen would result in material, financial and strategic losses


What example of this vulnerability category did you find?


Give details: Which workstation did you find it? Can you identify the person the desk belongs to? What could be done to prevent this?


10) (vulnerability category #10). Possession and/or use of software and/or storage media that management deems illegal and unsafe.


What example of this vulnerability category did you find?



Appendix - Violation Category from the InfoSec Game




Applied Sciences

Architecture and Design

Biology

Business & Finance

Chemistry

Computer Science

Geography

Geology

Education

Engineering

English

Environmental science

Spanish

Government

History

Human Resource Management

Information Systems

Law

Literature

Mathematics

Nursing

Physics

Political Science

Psychology

Reading

Science

Social Science

Home

Blog

Archive

Contact

google+twitterfacebook

Copyright © 2019 HomeworkMarket.com

Homework is Completed By:

Writer Writer Name Amount Client Comments & Rating
Instant Homework Helper

ONLINE

Instant Homework Helper

$36

She helped me in last minute in a very reasonable price. She is a lifesaver, I got A+ grade in my homework, I will surely hire her again for my next assignments, Thumbs Up!

Order & Get This Solution Within 3 Hours in $25/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 3 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 6 Hours in $20/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 6 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 12 Hours in $15/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 12 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

6 writers have sent their proposals to do this homework:

Helping Hand
Writer Writer Name Offer Chat
Helping Hand

ONLINE

Helping Hand

I am an Academic writer with 10 years of experience. As an Academic writer, my aim is to generate unique content without Plagiarism as per the client’s requirements.

$100 Chat With Writer

Let our expert academic writers to help you in achieving a+ grades in your homework, assignment, quiz or exam.

Similar Homework Questions

Which of the following statements most appropriately describes scenario analysis - Btec engineering level 3 assignments answers - Declaration of independence from homework - Read and Answer. - Three page history essay double-spaced - Succession planning goals and objectives - The retinas of predatory birds such as hawks - Sir john cass foundation primary school - Moral Philosophies and Cognitive Moral Development" - Tyrell building blade runner - Organizational behavior real research for real managers - Netwitness investigator application - A candidate for mayor in a small town has allocated - Answer the following question in 600 to 700 words - 2 paragraph 10/02/2020 - Gen y in the workforce case study analysis - Penicillin v 500 000 units - Managing change in organizations assignment - Rock cycle picture diagram - Accord info matrix reviews glassdoor - Thomas piketty venezuela - Financial accounting ifrs 3rd edition solution chapter 3 - How to find vertex from focus and directrix - Disadvantages of virtual fencing - Schema diagram for restaurant management system - Cateye double wireless sensor - Holistic nursing theory jean watson - Controversial Art and Censorship - Womb for rent ellen goodman - Case study treatment plan sample - Kubler ross grief curve - Aoa network diagram examples - The history of fashion photography book - 2k factorial design example - The goal book eliyahu m goldratt - Discuss the use of cloud backup strategies - Moral model of ethical decision making - What is doctor faustus about - Project Management - Kim addonizio first poem for you - Bus499 Assignment Week 3 - What ended greece's golden age making it vulnerable to invaders - Discussion - Simon ielts writing task 2 general training - L occitane garden city - Which branch of philosophy studies the nature of morality - Dce rpc and msrpc services enumeration reporting solution - Ross martin arrived at the following tax information - Zweig letter from an unknown woman - Dictionary data structure in java - 5016_ASS 3 # DRAFT 1 # Assessment 3 Instructions: Supply Chain Management Plan # MBA-FPX5016 Operations Mgmt For Leaders - 978 1 259 73278 2 - Xplore radiology emerald hills - The april bank statement for trimble corporation - Fresh Off the boat essay question of standards - Ent outpatients victoria hospital kirkcaldy - Assignment Needed - Essentials of organizational behavior 11th edition pdf - Iron iii nitrate health hazard rating - A new soft drink is being market tested - Adios mama short film english translation - Business - Seafood workers in the industrial revolution - Exercises for fourier analysis - Collaboration diagram for student registration system - What are behavioral observation scales in counseling - Remington 1187 action spring removal - Juvenile Bootcamps - 01.10 macbeth the power of words worksheet - Errors in theodolite surveying - The Remarkable Thing About Group Development - Hey google talk to headspace - Need in 6 hours - Case Study 1 & 2 Lyme Disease and Peripheral Vascular Disease - Definition of three gorges dam - Patient Education and Ethical Issues in Today’s Health Care - Acc 290 week 2 individual assignment answers - Regional business partners login - Comprehensive problem 1 period 2 the accounting cycle - Factor tree of 30 - Excel volume 1 grader project capstone - Personification in to kill a mockingbird with page numbers - How to spot a witch by adam goodheart worksheet - Analytical Essay - The following balance sheet for the hubbard corporation was prepared by the company: - : Health Information Systems Powerpoint - National association of social workers code of ethics apa citation - Cisco 8841 speed dial - Fung sin hardware & supply - Assignment -6-1 - Plane - Accounting chapter 9 answer key - Berkshire Hathaway Cash Position, Positive Cash Flow and Short-term financing - What is the best case time complexity of insertion sort - General mills acquisition of pillsbury from diageo plc - Paid in capital in excess of par preferred stock - 3 pages nedded - Python Assignment with two-items association rule (due in 5 hrs) - Institute of medicine future of nursing - What a texter usually expects crossword