Information Security > DISCUSSION POST > SEC-571 Week 1 Discussion Question 1: Vulnerabilities of Your Systems (All)

SEC-571 Week 1 Discussion Question 1: Vulnerabilities of Your Systems

Document Content and Description Below

SEC-571 Week 1 Discussion Question 1: Vulnerabilities of Your Systems Vulnerabilities of Your Systems (graded) Note: You can discuss your experiences in "Your Personal Security Research" as an alt... ernative to the standard questions below. We're spending some time this week coming up with a common understanding of security terminology, and vulnerability is one of those fundamental terms. While the word weakness seems to define it pretty well, there are a number of ways that information systems can become vulnerable. Acts of commission or omission can be equally responsible for a system vulnerability. What about your systems, both at home and at work (or other work places)? In what ways are they vulnerable? BE GENERAL - DO NOT PROVIDE ANY INFORMATION THAT MAY LEAD TO HARM. Because we also addressed this in class, only one quality postingis required here. Please feel free to do more and engage your classmates in a professional exchange of ideas. Respond This section lists options that can be used to view responses. Collapse All Print View Show Options Responses Responses are listed below in the following order: response, author and the date and time the response is posted. Sort by Response Sort by Author Sort by Date/Time* (an instructor response) Vulnerabilities of Your Systems Professor Sibrizzi 8/26/2015 8:33:00 PM I shall introduce this in class when we meet. Respond I shall introduce this in class when we meet. RE: Vulnerabilities of Your Systems Nichole Williams 9/14/2015 6:49:45 PM At home I currently use our business office work stations. These workstations are also connected to a server that allows wifi use for all tenants or anyone within close enough proximity to access the service. The password for the wifi has been the same since 2012. While on one of the thin clients I have the capability to view the screen of other users who are using the system. Many tenants use these thin clients to pay their monthly rent. vulnerability exist due to outdated password and the ability to view live transactions from others on the network. Respond At home I currently use our business office work stations. These workstations ar… (an instructor response) Vulnerabilities of Your Systems Professor Sibrizzi 8/30/2015 12:37:02 PM Just checking in. See you in class. Respond Just checking in. See you in class. Vulnerable Arthur Jones 8/30/2015 2:11:11 PM One of the problems we were having at work with our student work centers was students being able to access unauthorized sites. We had a firewall in place to prevent it, but students were often able to get around it without the teachers typing in the internet access password. The goal * Times are displayed in (GMT-07:00) Mountain Time (US & Canada) [Show More]

Last updated: 9 months ago

Preview 1 out of 3 pages

Reviews( 0 )

$7.00

Add to cart

Instant download

Can't find what you want? Try our AI powered Search

OR

GET ASSIGNMENT HELP
38
0

Document information


Connected school, study & course


About the document


Uploaded On

Jul 20, 2023

Number of pages

3

Written in

Seller


seller-icon
Doc.Mukai Edyth

Member since 1 year

0 Documents Sold


Additional information

This document has been written for:

Uploaded

Jul 20, 2023

Downloads

 0

Views

 38

More From Doc.Mukai Edyth

View all Doc.Mukai Edyth's documents »

Recommended For You

What is Browsegrades

In Browsegrades, a student can earn by offering help to other student. Students can help other students with materials by upploading their notes and earn money.

We are here to help

We're available through e-mail, Twitter, Facebook, and live chat.
 FAQ
 Questions? Leave a message!

Follow us on
 Twitter

Copyright © Browsegrades · High quality services·