Reference no: EM133195928 , Length: 3 Pages
Part I
Course Feedback. Please provide feedback on the course. What did you like, what did you learn, what did you not like and what can I do to improve the course?
Part II
Mr Scott is considering partnering with a company. The transaction is not public yet and Mr. Scott has asked what we need to look at when we visit the company in terms of both their physical and cybersecurity... (Note: I am looking for things that we discussed in this course). This is a medium-sized company with about 400 employees, typical computers, servers, and office space. I recommend a supporting image of what their office space looks like.
One of your friends is familiar with the company and found out the following:
They have a very small parking lot and on the weekends, it seems to be a hangout for teenagers. Several incidents have been reported involving vandalism and apparently, there was a case of criminal trespassing.
No inventories have been completed recently
There was a cyber breach similar to the Target case years ago.
Part III
Mr Scott is curious about the logical and physical perimeters of a cell phone. Is this something that Techworx can use to help our employees understand how we can protect? Assuming so, he would like you to do a physical and cyber perimeter analysis of a cell phone.