Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

E2. Give examples of how individuals can act as vulnerabilities, defenses, or th

ID: 639233 • Letter: E

Question

E2. Give examples of how individuals can act as vulnerabilities, defenses, or threats to an information system. [20 pts]

E5. Draw a diagram of the physical security boundary around your current living space. Identify possible points of entry. Describe how the physical boundary is kept secure if you are not present. [20pts]

E8. Make a list of the really important tasks performed by your personal computer, following examples in Sections 1.3 and 1.5. If you do not own your own computer, describe one that you regularly use for class work. List the physical and information assets you rely upon to perform these tasks. [20 pts]

E9. Following the example in Section 1.5, do a risk assessment of your own personal computer. Be sure to answer Exercise E8 first, and be sure that your risk assessment reflects your most important tasks and assets. Show the results in a table that uses the same format as Table 1.2. [20 pts]

Explanation / Answer

1. Vulnerabilities
Vulnerabilities in network security can be summed up as the