INTRODUCTION TO CYBERSECURTY

 

 

Mr Scott is considering partnering with a company. The transaction is not public yet and Mr. Scott has asked what we need to look at when we visit the company in terms of both their physical and cybersecurity… (Note: I am looking for things that we discussed in this course). This is a medium-sized company with about 400 employees, typical computers, servers, and office space. I recommend a supporting image of what their office space looks like.

One of your friends is familiar with the company and found out the following:

There are vending machines in the data center. The policy requires that an IT person be in the data center while the vendor restocks the machines but this does not always happen.
The account lockout threshold is set to 0.
Recently all the Event log files were deleted from several servers and IT has not explained what happened.
Part III: NICE Challenge Heartbleed Vulnerability.

Please follow the instructions below as I am not requiring you to do the entire challenge. No need to get the checkmark to turn green.

What part of the CIA Triad is compromised with this exploit/vulnerability?

PART IV. Complete the week 10 challenges and give a complete summary of how you did in the CTF for the entire course.

 

The post INTRODUCTION TO CYBERSECURTY first appeared on COMPLIANT PAPERS.

Reference no: EM132069492

WhatsApp
Hello! Need help with your assignments? We are here

GRAB 25% OFF YOUR ORDERS TODAY

X