Reference no: EM132088491
Part 1: Conduct a threat and risk assessment on you (i.e. home/apartment "system")
You will conduct the following steps:
a) Identify scope
b) collect data --> you don't have to do any port scanning but a generic network topology can be done
c) vulnerability analysis --> don't do any automatic scans but research what vulnerabilities exist for the devices/systems that you have in your scope
d) Threat Assessment --> consider what the threats are (human and nonhuman) and evaluate them based on understanding of previous steps
e) Write a conclusion based on what you are going to do now in response to what you have learned
Part 2:
Research and answer these questions (from slide 5-22)
2.1) What types of threats do smart phones face?
2.2) Are there any particular vulnerabilities to your type of device you have in your "system"
2.3) What did Nicolas Seriot's "Spyphone" prove?
2.4) Are apps more or less likely to be subject to threats than traditional PC software programs (use data to support your argument)?