Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Management Information System Expert

For this activity, you will play the Agent Surefire: InfoSec game, which is an extension of the risk assessment project (final project) scenario.

Access the game on the Jones & Bartlett Learning website.

You should discover, assess, and describe at least seven security vulnerabilities within the virtual environment. Correctly categorize each vulnerability based on the methods specified in the game. The virtual environment should be viewed as part of the system described in your final project.

Detailed instructions will be provided once you access the game. This can be expected to take about 45 minutes to an hour. You are not required to play the game to its conclusion (although you might want to!). The purpose of this game play is to discover physical vulnerabilities that you can use for your final project.

1) (vulnerability category #1). Cabinet and drawers left unlocked and/or their keys unsecured (even if they are empty).

What example of this vulnerability category did you find?

2) (vulnerability category #2). Documents and media containing business information left unconcealed and/or unsecured.

What example of this vulnerability category did you find?

3) (Mandatory - vulnerability category #3). Documents or media with employee, client or partner information left unconcealed and unsecured.

What example of this vulnerability category did you find?

Give details: Which workstation did you find it? Can you identify the person the desk belongs to? What could be done to prevent this?

4) (vulnerability category #4). Improper disposal of documents containing sensitive information.

What example of this vulnerability category did you find?

5) (vulnerability category #5). Leaving the computer terminals or password-protected software running and unlocked.

What example of this vulnerability category did you find?

6) (vulnerability category #6). Leaving password protected software and running and unlocked

What example of this vulnerability category did you find?

7) (Mandatory - vulnerability category #7). Unconcealed PIN numbers and passwords

What example of this vulnerability category did you find?

Give details: Which workstation did you find it? Can you identify the person the desk belongs to? What could be done to prevent this?

8) (vulnerability category #8). Using predictable PIN numbers to access Voicemail

What example of this vulnerability category did you find?

9) (Mandatory - vulnerability category #9). Portable hardware left unattended, which if stolen would result in material, financial and strategic losses

What example of this vulnerability category did you find?

Give details: Which workstation did you find it? Can you identify the person the desk belongs to? What could be done to prevent this?

10) (vulnerability category #10). Possession and/or use of software and/or storage media that management deems illegal and unsafe.

What example of this vulnerability category did you find?

Attachment:- Security Risk Analysis.rar

Management Information System, Management Studies

  • Category:- Management Information System
  • Reference No.:- M92566078

Have any Question?


Related Questions in Management Information System

Exercise 73 filling the human gapyou work for a medium

Exercise 7.3: Filling the Human Gap You work for a medium seized manufacturing company that has a well developed DR plan. The plan is well tested and the testing has revealed a serious personnel gap During a recovery, ke ...

Answer the following question 1 does innovation tend to

Answer the following Question : 1.) Does innovation tend to reduce social inequality or deepen it? Explain your answer. 2.) How is the Internet of Things changing the way we live? List and discuss three popular technolog ...

Assignment capabilities proposal you are a 10 million

Assignment : Capabilities Proposal You are a $10 million consulting company responding to a Capabilities Proposal for a prospective client. The client seeks an analysis of its existing network in anticipation of a large ...

Topic we all had the unfortunate experience of seeing how

Topic: We all had the unfortunate experience of seeing how computers can, at times, make life's journey abit more difficult. This is especially true in knowledge centric workplaces. Describe an example of a very poorly i ...

Part 1identify at least five 5 algorithm differences that

Part 1 Identify at least five (5) algorithm differences that might be considered when choosing a sort algorithm. Offer examples of related sorts with the discussion of each difference considered. Part 2: Rationalize You ...

Case questions1describe the process from the customers

Case Questions 1. Describe the process (from the customer's perspective) of purchasing and obtaining office supplies through Staple's online / e-commerce channel using a process flow diagram. Your process diagram should ...

You need an assignment about business continuity plan and

You need an assignment about Business continuity plan and disaster recovery plan: Topics covered are : - 1)- An Overview of Information Security and Risk Management 2) - Planning for Organizational Readiness 3) - Conting ...

1 discuss the difference between a business continuity plan

1. Discuss the difference between a Business Continuity Plan (BCP), and a Disaster Recovery Plan (DRP). 2. What would be your recommendation for training personnel on your BCP and DRP if your plan documents were adopted ...

Taskyour team task is to address two network security

Task: Your team task is to address two network security problems that this organization's network faces and use scholarly research to help document the findings. Preparing your paper: Your team makes up the nature of Sou ...

In the health care industry the topic of network topology

In the health care industry, the topic of network topology is becoming increasingly important as hospitals, clinics, and other supports consider adding more devices and equipment to existing networks or building addition ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As