Conduct a security review

Assignment Help Computer Network Security
Reference no: EM133467988

Assignment:

You are a security consultant for Bonafide Corporation, and have been assigned to observe the actions of Bubba's Cleaning and Janitorial Service, conduct a security review, and communicate your findings and recommendations to the company's Chief Executive Officer.

Bonafide's floors are vacuumed and mopped each evening and the trash is collected in large bins that are placed at curbside for pick-up twice a week. You visit the dumpster the evening of a pickup after the Bubba's cleaning crew left the facility. You climb into the dumpster (wearing gloves and a mask) and sort through the trash. You find the following items: a Bonafide telephone directory, two USB drives, a Windows 10 training kit, Oracle magazines, print-outs of computer programs in Java and HTML with references to a SQL Server database, company memos on letterhead, food wrappers, an empty whiskey bottle, a pay stub, a handful of resumes, a box of business cards, and a set of keys in a baggie.

Based on this information, detail your findings and explaining the relevance of each of these items and the potential security impact to Bonafide, i.e., what could happen if any or all of these items fell into the wrong hands. Conclude with your recommendations to Bonafide's CEO on what should be included in developing a security plan.

Reference no: EM133467988

Questions Cloud

Strongest impact on development : explain why you think nature, nurture, or both has/have the strongest impact on development. Include information from the video and scholarly resources
Why is ddos attack harmful to businesses : Why is DDOS attack harmful to businesses? What are some mitigation techniques you would recommend?
Identify the process of policy making from idea : Identify the process of policy making from idea to ratification at your local and state levels, and at the national level for the United States
What is the role of the department of defense in border : What would be the consequences/impact to the United States if the border was suddenly made less open and more "secure"? This is a strategic security question
Conduct a security review : You are a security consultant for Bonafide Corporation, and have been assigned to observe the actions of Bubba's Cleaning and Janitorial Service.
How that phenomenon or theory can be applied : perform a literature search to locate five empirically reviewed academic articles illustrating how that phenomenon or theory can be applied to a common human
How will this object be beneficial within society : The object you choose can contain only the parts and accessories that are normally part of that object, such as wires or batteries, but nothing else.
Implementing an effective defense against social engineering : This should include the concepts of autonomy, mastery, and purpose for motivating proper employee behavior.
What are your thoughts on political factors that influence : What are your thoughts on political factors that influence and determine the best financial management practices? What is the one thing that you have learned

Reviews

Write a Review

Computer Network Security Questions & Answers

  Identify at least two criminology theories

Motive is one of the main themes that law enforcement must identify in order to prevent future crimes. Law enforcement utilizes the science of criminology to understand criminality and identify potential criminals.  1. Identify at least two criminol..

  Draft the required system security plan for a system

As a staff member supporting the CISO, you have been asked to research and then draft the required system security plan for a General Support System

  Appraise the individual and organizational consequences of

1.compare and contrast the mis in place in two distinctly different organizations.2.compare each organizations use of

  What the Key differences between PIPEDA and the Privacy Act

CST8230 Security & Laws Assignment - What are some of the key differences between PIPEDA and the Privacy Act? List at least 2 key differences between them

  Implementation of Network Reconnaissance

Demonstrate understanding and implementation of Network Reconnaissance, Exploitation and Reverse Engineering security tools

  What operating systems can be protected by the application

Provide a description of each application, how many devices it may be installed on, and what operating systems can be protected by the application.

  What password protection measures taken system administrator

What password protection measures are normally implemented by system administrators, operating systems, and security services? Describe the pros and cons of enabling audits of resource accesse

  CMIT 425 Advanced Information Systems Security Assignment

CMIT 425 Advanced Information Systems Security Assignment Help and Solution - University of Maryland Global Campus, Maryland, USA - Homework Help

  What procedure could help prevent similar breach of security

Create a 2- to 3-page report in a Microsoft Word document. Analyze what procedures could help prevent a similar breach of security at your organization.

  What do you think you can learn from given commands

What kinds of things do you think the administrator will see on the output? Based on your work this week, what do you think you can learn from such commands?

  Presentation on wireless networking

presentation on wireless networking

  Conduct a complete penetration testing

Conduct a complete penetration testing on one or two targets and create a professional and well formatted Penetration

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd