Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Human Decision and Security Engineering Week # 2 Assignment 1 Information Gathering This week we talked about dumpster diving and explored the risks of improperly

Human Decision and Security Engineering Week #2 Assignment 1
Information Gathering
This week we talked about dumpster diving and explored the risks of improperly disposing of sensitive information. Use the tools and techniques from your readings this week to complete the following tasks:
Part A:
Using common open source information gathering techniques, compile a dossier of readily available information about yourself. Consider dumpster diving your own trash, use Google and any other public information source to compile as much information on yourself as possible. Describe what information you found and what sources you used. Do not provide personally identifiable information (PII) but do be specific with the resources you used to compile your dossier. You may compile the dossier on a famous person instead of yourself if you so choose.
Part B:
Write a policy that determines where sensitive information may exist within your organization and how it should be disposed of securely. Be sure to evaluate each of the sources identified in your reading and from Part A of this assignment.Human Decision and Security Engineering Week #2 Assignment 1
Information Gathering
This week we talked about dumpster diving and explored the risks of improperly disposing of sensitive information. Use the tools and techniques from your readings this week to complete the following tasks:
Part A:
Using common open source information gathering techniques, compile a dossier of readily available information about yourself. Consider dumpster diving your own trash, use Google and any other public information source to compile as much information on yourself as possible. Describe what information you found and what sources you used. Do not provide personally identifiable information (PII) but do be specific with the resources you used to compile your dossier. You may compile the dossier on a famous person instead of yourself if you so choose.
Part B:
Write a policy that determines where sensitive information may exist within your organization and how it should be disposed of securely. Be sure to evaluate each of the sources identified in your reading and from Part A of this assignment.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image_2

Step: 3

blur-text-image_3

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

More Books

Students also viewed these Databases questions

Question

Show Theorem 3.3. Hint: Show that x1 f (x j r ) 1 r2 f (x j r 2).

Answered: 1 week ago

Question

2. What is the business value of security and control?

Answered: 1 week ago