INTRODUCTION TO CYBERSECURTY

Part I:  Course Feedback.  Please provide feedback on the course. What did you like, what did you learn, what did you not like and what can I do to improve the course? 

Part II:  Mr Scott is considering partnering with a company.  The transaction is not public yet and Mr. Scott has asked what we need to look at when we visit the company in terms of both their physical and cybersecurity…  (Note: I am looking for things that we discussed in this course).  This is a medium-sized company with about 400 employees, typical computers, servers, and office space.   I recommend a supporting image of what their office space looks like.

One of your friends is familiar with the company and found out the following:

  • There are vending machines in the data center. The policy requires that an IT person be in the data center while the vendor restocks the machines but this does not always happen. 
  • The account lockout threshold is set to 0.
  • Recently all the Event log files were deleted from several servers and IT has not explained what happened.

Part III:  NICE Challenge Heartbleed Vulnerability

Please follow the instructions below as I am not requiring you to do the entire challenge.  No need to get the checkmark to turn green. 

What part of the CIA Triad is compromised with this exploit/vulnerability?

PART IV.  Complete the week 10 challenges and give a complete summary of how you did in the CTF for the entire course.  

NEED A CUSTOMIZED PAPER ON THE ABOVE DETAILS?

Submit your order now!