I. Watch the video below and identify or describe minimum 5 key weakness or behaviors which allow an attacker to gain access (https://www.youtube.com/watch?v=zA50pSZcesc) II. Watch the video . Based...

1 answer below »


I. Watch the video below and identify or describe minimum 5 key weakness or behaviors which allow an attacker to gain access (https://www.youtube.com/watch?v=zA50pSZcesc)



II. Watch the video . Based on Week02 lecture, Imagine that you have been hired to write a policy relating to the “social networking and online presence” of employees for a large company (e.g., Microsoft, Cisco, or Oracle). The CEO has seen this video and wants the employees of the company to be careful that their online presence does not undermine the passwords and PIN access codes used by employees to protect company accounts. Write a set of 3-4 statements that should exist in this policy. Ensure that your statements are reasonable and realistic. http://www.youtube.com/watch?feature=player_embedded&v=F7pYHN9iC9I.



@font-face {font-family:Mangal; panose-1:2 4 5 3 5 2 3 3 2 2; mso-font-charset:1; mso-generic-font-family:roman; mso-font-pitch:variable; mso-font-signature:40963 0 0 0 1 0;}@font-face {font-family:"Cambria Math"; panose-1:2 4 5 3 5 4 6 3 2 4; mso-font-charset:0; mso-generic-font-family:roman; mso-font-pitch:variable; mso-font-signature:-536870145 1107305727 0 0 415 0;}@font-face {font-family:Calibri; panose-1:2 15 5 2 2 2 4 3 2 4; mso-font-charset:0; mso-generic-font-family:swiss; mso-font-pitch:variable; mso-font-signature:-1610611985 1073750139 0 0 159 0;}@font-face {font-family:TimesNewRomanPSMT; panose-1:2 11 6 4 2 2 2 2 2 4; mso-font-alt:"Times New Roman"; mso-font-charset:0; mso-generic-font-family:roman; mso-font-pitch:auto; mso-font-signature:0 0 0 0 0 0;}p.MsoNormal, li.MsoNormal, div.MsoNormal {mso-style-unhide:no; mso-style-qformat:yes; mso-style-parent:""; margin:0in; mso-pagination:widow-orphan; font-size:12.0pt; font-family:"Calibri",sans-serif; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:Calibri; mso-fareast-theme-font:minor-latin; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin; mso-bidi-font-family:Mangal; mso-bidi-theme-font:minor-bidi; mso-bidi-language:AR-SA;}p {mso-style-noshow:yes; mso-style-priority:99; mso-margin-top-alt:auto; margin-right:0in; mso-margin-bottom-alt:auto; margin-left:0in; mso-pagination:widow-orphan; font-size:12.0pt; font-family:"Times New Roman",serif; mso-fareast-font-family:"Times New Roman";}.MsoChpDefault {mso-style-type:export-only; mso-default-props:yes; mso-bidi-font-size:12.0pt; font-family:"Calibri",sans-serif; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:Calibri; mso-fareast-theme-font:minor-latin; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin; mso-bidi-font-family:Mangal; mso-bidi-theme-font:minor-bidi; mso-bidi-language:AR-SA;}div.WordSection1 {page:WordSection1;}ol {margin-bottom:0in;}ul {margin-bottom:0in;}

Answered 1 days AfterMar 04, 2021

Answer To: I. Watch the video below and identify or describe minimum 5 key weakness or behaviors which allow an...

Ali Asgar answered on Mar 06 2021
141 Votes
Video Task 1:
Identifying 5 Key weaknesses or behaviours of the security teams and systems which al
lowed the Tiger Team to gain access:
1. Physical Security: The building of the jewellery shop had no security check-up or entry check-point for doing any physical security. Also, there were NO CCTV in the lobby and elevator thus creating a blind stop for any criminal to install any malicious hardware or hide a weapon to be used in actual crime.
2. Weak security training to owners, workers and staff at the Jewellery shop.
a. The team was easily able to bypass “a referral only” rule of the store by acting like a journalist over the phone. The owner did not even try to find if the reporter calling was even working for the magazine or not.
b. The Tiger Team members, easily got the secretary to attach a USB device to the PC without any hesitation.
c. The Tiger Team was easily able to extract sensitive and confidential information from the owners during interview without any...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here