The world’s Largest Sharp Brain Virtual Experts Marketplace Just a click Away
Levels Tought:
Elementary,Middle School,High School,College,University,PHD
| Teaching Since: | May 2017 |
| Last Sign in: | 398 Weeks Ago, 3 Days Ago |
| Questions Answered: | 66690 |
| Tutorials Posted: | 66688 |
MCS,PHD
Argosy University/ Phoniex University/
Nov-2005 - Oct-2011
Professor
Phoniex University
Oct-2001 - Nov-2016
E2. Give examples of how individuals can act as vulnerabilities, defenses, or threats to an information system. [20 pts]
E5. Draw a diagram of the physical security boundary around your current living space. Identify possible points of entry. Describe how the physical boundary is kept secure if you are not present. [20pts]
E8. Make a list of the really important tasks performed by your personal computer, following examples in Sections 1.3 and 1.5. If you do not own your own computer, describe one that you regularly use for class work. List the physical and information assets you rely upon to perform these tasks. [20 pts]
E9. Following the example in Section 1.5, do a risk assessment of your own personal computer. Be sure to answer Exercise E8 first, and be sure that your risk assessment reflects your most important tasks and assets. Show the results in a table that uses the same format as Table 1.2. [20 pts]
Hel-----------lo -----------Sir-----------/Ma-----------dam-----------Tha-----------nk -----------You----------- fo-----------r u-----------sin-----------g o-----------ur -----------web-----------sit-----------e a-----------nd -----------and----------- ac-----------qui-----------sit-----------ion----------- of----------- my----------- po-----------ste-----------d s-----------olu-----------tio-----------n.P-----------lea-----------se -----------pin-----------g m-----------e o-----------n c-----------hat----------- I -----------am -----------onl-----------ine----------- or----------- in-----------box----------- me----------- a -----------mes-----------sag-----------e I----------- wi-----------ll