Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Part 1: Create a top-level post on the following topic: -I want you to identify and explain all the times during a typical work/school day

Part 1: Create a top-level post on the following topic:

-I want you to identify and explain all the times during a typical work/school day that your PII effectively is in the cloud. By cloud, I mean the data is not fully under your control (such as a home network). Please list each time you can think of and put some thought into it. Remember that cell phones are also computers that are connected to a network. (Hint: everyone should have at least 1 time their PII traverses a network they do not control since you logged into Blackboard). I also want you to identify any security weakness you have in place for each incident you list. Do NOT reveal personal details such as passwords or usernames, merely explain the situation and any poor security controls in place.

Part 2: Reply to at least 1 fellow student with the following:

-Your task for your reply is to think like a hacker. Choose a post and identify at least 3 methods you would personally use to attempt to hack into and steal the PII of the original poster. Please be specific and cite source material and indicate which vulnerability or security weakness you will target.

Important!!!: Please approach this assignment from a technical perspective. Do not get offended by anyone's attack methods. Our job is to think outside standard security controls and identify weaknesses so that we can better protect ourselves and our technology environment. I can assure you that I have a number of security vulnerabilities myself. I have not changed many of my personal passwords over a year and my social media password in over 2 years. My phone PIN is only 4 characters as well. Consider this a security assessment (which normally people pay for). Remember that the quality of post 2 directly comes from the detail in post 1, so PLEASE put some effort into post 1 and really identify what you consider security weaknesses with your standard operations.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image_2

Step: 3

blur-text-image_3

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

XML Data Management Native XML And XML Enabled Database Systems

Authors: Akmal Chaudhri, Awais Rashid, Roberto Zicari, John Fuller

1st Edition

0201844524, 978-0201844528

More Books

Students also viewed these Databases questions

Question

What is human nature?

Answered: 1 week ago

Question

What did they do? What did they say?

Answered: 1 week ago