SlideShare a Scribd company logo
1 of 1
Download to read offline
For your selected target organization perform research and examine physical security of your
target and social engineering tactics you might use against your target. Identify important
vulnerabilities for physical security and social engineering.
Create a document in which you summarize in 1-3 sentence your findings.
Then for each vulnerability you identify, name it, provide a description, provide information on
how this vulnerability can be exploited, and describe what could happen (consequences) if an
attacker exploited this vulnerability.
Consider the following attributes as you assess the seriousness of each vulnerability, and rate
each one HIGH, MEDIUM, or LOW risk, and briefly (1 sentence) explain your rating.
Confidentiality: (can attacker access information that should not be disclosed, and if so, how
much?)
Integrity: (can attacker modify system files or information, and if so, how much?)
Availability: (can an attacker reduce performance of system or interrupt availability of this
resource, and if so, how much?)
Access Complexity (how skilled does an attacker need to be, or how much special access would
they need, in order to exploit this vulnerability

More Related Content

Similar to For your selected target organization perform research and examine phy.pdf

A Behavior Based Intrusion Detection System Using Machine Learning Algorithms
A Behavior Based Intrusion Detection System Using Machine Learning AlgorithmsA Behavior Based Intrusion Detection System Using Machine Learning Algorithms
A Behavior Based Intrusion Detection System Using Machine Learning AlgorithmsCSCJournals
 
WEEK 3 ESSAY QUESTIONS Instructions Answer all questions .docx
WEEK 3 ESSAY QUESTIONS Instructions Answer all questions .docxWEEK 3 ESSAY QUESTIONS Instructions Answer all questions .docx
WEEK 3 ESSAY QUESTIONS Instructions Answer all questions .docxcockekeshia
 
Research Paper on STRIDEPresented By.docx
Research Paper on STRIDEPresented By.docxResearch Paper on STRIDEPresented By.docx
Research Paper on STRIDEPresented By.docxronak56
 
Threats vs. Vulnerabilities
Threats vs. Vulnerabilities Threats vs. Vulnerabilities
Threats vs. Vulnerabilities Roger Johnston
 
TAXONOMY BASED INTRUSION ATTACKS AND DETECTION MANAGEMENT SCHEME IN PEER-TOPE...
TAXONOMY BASED INTRUSION ATTACKS AND DETECTION MANAGEMENT SCHEME IN PEER-TOPE...TAXONOMY BASED INTRUSION ATTACKS AND DETECTION MANAGEMENT SCHEME IN PEER-TOPE...
TAXONOMY BASED INTRUSION ATTACKS AND DETECTION MANAGEMENT SCHEME IN PEER-TOPE...IJNSA Journal
 
Write the questions followed by your answers.1.Using the web.docx
Write the questions followed by your answers.1.Using the web.docxWrite the questions followed by your answers.1.Using the web.docx
Write the questions followed by your answers.1.Using the web.docxrochellwa9f
 
PPT0-Computer Security Concepts.pptx
PPT0-Computer Security Concepts.pptxPPT0-Computer Security Concepts.pptx
PPT0-Computer Security Concepts.pptxPiBits
 
02-overview.pptx
02-overview.pptx02-overview.pptx
02-overview.pptxEmanAzam
 
Chapter 1 overview
Chapter 1 overviewChapter 1 overview
Chapter 1 overviewdr_edw777
 
Threat Modelling and managed risks for medical devices
Threat Modelling and managed risks for medical devicesThreat Modelling and managed risks for medical devices
Threat Modelling and managed risks for medical devicesFrédéric Sagez
 
Automated Emerging Cyber Threat Identification and Profiling Based on Natural...
Automated Emerging Cyber Threat Identification and Profiling Based on Natural...Automated Emerging Cyber Threat Identification and Profiling Based on Natural...
Automated Emerging Cyber Threat Identification and Profiling Based on Natural...Shakas Technologies
 
((Anatomy of a Security IncidentAttack)) will survey current threat.docx
((Anatomy of a Security IncidentAttack)) will survey current threat.docx((Anatomy of a Security IncidentAttack)) will survey current threat.docx
((Anatomy of a Security IncidentAttack)) will survey current threat.docxajoy21
 
What is the process of Vulnerability Assessment and Penetration Testing.pdf
What is the process of Vulnerability Assessment and Penetration Testing.pdfWhat is the process of Vulnerability Assessment and Penetration Testing.pdf
What is the process of Vulnerability Assessment and Penetration Testing.pdfElanusTechnologies
 
Network Threats and Attacks SubscribeYou have now learne.docx
Network Threats and Attacks SubscribeYou have now learne.docxNetwork Threats and Attacks SubscribeYou have now learne.docx
Network Threats and Attacks SubscribeYou have now learne.docxkendalfarrier
 
20160831_app_storesecurity_Seminar
20160831_app_storesecurity_Seminar20160831_app_storesecurity_Seminar
20160831_app_storesecurity_SeminarJisoo Park
 
Answer the following questions. Each question response should be at .docx
Answer the following questions. Each question response should be at .docxAnswer the following questions. Each question response should be at .docx
Answer the following questions. Each question response should be at .docxspoonerneddy
 
Make sure questions and references are included! Determine how s.docx
Make sure questions and references are included! Determine how s.docxMake sure questions and references are included! Determine how s.docx
Make sure questions and references are included! Determine how s.docxBetseyCalderon89
 
Introduction to Computer Security
Introduction to Computer SecurityIntroduction to Computer Security
Introduction to Computer SecurityKamal Acharya
 

Similar to For your selected target organization perform research and examine phy.pdf (20)

A Behavior Based Intrusion Detection System Using Machine Learning Algorithms
A Behavior Based Intrusion Detection System Using Machine Learning AlgorithmsA Behavior Based Intrusion Detection System Using Machine Learning Algorithms
A Behavior Based Intrusion Detection System Using Machine Learning Algorithms
 
WEEK 3 ESSAY QUESTIONS Instructions Answer all questions .docx
WEEK 3 ESSAY QUESTIONS Instructions Answer all questions .docxWEEK 3 ESSAY QUESTIONS Instructions Answer all questions .docx
WEEK 3 ESSAY QUESTIONS Instructions Answer all questions .docx
 
Research Paper on STRIDEPresented By.docx
Research Paper on STRIDEPresented By.docxResearch Paper on STRIDEPresented By.docx
Research Paper on STRIDEPresented By.docx
 
Threats vs. Vulnerabilities
Threats vs. Vulnerabilities Threats vs. Vulnerabilities
Threats vs. Vulnerabilities
 
Threat modelling
Threat modellingThreat modelling
Threat modelling
 
Octav ethreat profiles
Octav ethreat profilesOctav ethreat profiles
Octav ethreat profiles
 
TAXONOMY BASED INTRUSION ATTACKS AND DETECTION MANAGEMENT SCHEME IN PEER-TOPE...
TAXONOMY BASED INTRUSION ATTACKS AND DETECTION MANAGEMENT SCHEME IN PEER-TOPE...TAXONOMY BASED INTRUSION ATTACKS AND DETECTION MANAGEMENT SCHEME IN PEER-TOPE...
TAXONOMY BASED INTRUSION ATTACKS AND DETECTION MANAGEMENT SCHEME IN PEER-TOPE...
 
Write the questions followed by your answers.1.Using the web.docx
Write the questions followed by your answers.1.Using the web.docxWrite the questions followed by your answers.1.Using the web.docx
Write the questions followed by your answers.1.Using the web.docx
 
PPT0-Computer Security Concepts.pptx
PPT0-Computer Security Concepts.pptxPPT0-Computer Security Concepts.pptx
PPT0-Computer Security Concepts.pptx
 
02-overview.pptx
02-overview.pptx02-overview.pptx
02-overview.pptx
 
Chapter 1 overview
Chapter 1 overviewChapter 1 overview
Chapter 1 overview
 
Threat Modelling and managed risks for medical devices
Threat Modelling and managed risks for medical devicesThreat Modelling and managed risks for medical devices
Threat Modelling and managed risks for medical devices
 
Automated Emerging Cyber Threat Identification and Profiling Based on Natural...
Automated Emerging Cyber Threat Identification and Profiling Based on Natural...Automated Emerging Cyber Threat Identification and Profiling Based on Natural...
Automated Emerging Cyber Threat Identification and Profiling Based on Natural...
 
((Anatomy of a Security IncidentAttack)) will survey current threat.docx
((Anatomy of a Security IncidentAttack)) will survey current threat.docx((Anatomy of a Security IncidentAttack)) will survey current threat.docx
((Anatomy of a Security IncidentAttack)) will survey current threat.docx
 
What is the process of Vulnerability Assessment and Penetration Testing.pdf
What is the process of Vulnerability Assessment and Penetration Testing.pdfWhat is the process of Vulnerability Assessment and Penetration Testing.pdf
What is the process of Vulnerability Assessment and Penetration Testing.pdf
 
Network Threats and Attacks SubscribeYou have now learne.docx
Network Threats and Attacks SubscribeYou have now learne.docxNetwork Threats and Attacks SubscribeYou have now learne.docx
Network Threats and Attacks SubscribeYou have now learne.docx
 
20160831_app_storesecurity_Seminar
20160831_app_storesecurity_Seminar20160831_app_storesecurity_Seminar
20160831_app_storesecurity_Seminar
 
Answer the following questions. Each question response should be at .docx
Answer the following questions. Each question response should be at .docxAnswer the following questions. Each question response should be at .docx
Answer the following questions. Each question response should be at .docx
 
Make sure questions and references are included! Determine how s.docx
Make sure questions and references are included! Determine how s.docxMake sure questions and references are included! Determine how s.docx
Make sure questions and references are included! Determine how s.docx
 
Introduction to Computer Security
Introduction to Computer SecurityIntroduction to Computer Security
Introduction to Computer Security
 

More from gargtex

From 1979 to 2012 - annual Arctic sea ice extent has stayed the same d.pdf
From 1979 to 2012 - annual Arctic sea ice extent has stayed the same d.pdfFrom 1979 to 2012 - annual Arctic sea ice extent has stayed the same d.pdf
From 1979 to 2012 - annual Arctic sea ice extent has stayed the same d.pdfgargtex
 
From April to July 2018- the number of employed youth 16 to 24 years o.pdf
From April to July 2018- the number of employed youth 16 to 24 years o.pdfFrom April to July 2018- the number of employed youth 16 to 24 years o.pdf
From April to July 2018- the number of employed youth 16 to 24 years o.pdfgargtex
 
Foutney Incorporated has provided the following data for the month of.pdf
Foutney Incorporated has provided the following data for the month of.pdfFoutney Incorporated has provided the following data for the month of.pdf
Foutney Incorporated has provided the following data for the month of.pdfgargtex
 
Freshwater fishes need to get rid of excess water (which -wants- to fl.pdf
Freshwater fishes need to get rid of excess water (which -wants- to fl.pdfFreshwater fishes need to get rid of excess water (which -wants- to fl.pdf
Freshwater fishes need to get rid of excess water (which -wants- to fl.pdfgargtex
 
Frenzied cruise vacationers besiege Tatiana- their excursion coordinat.pdf
Frenzied cruise vacationers besiege Tatiana- their excursion coordinat.pdfFrenzied cruise vacationers besiege Tatiana- their excursion coordinat.pdf
Frenzied cruise vacationers besiege Tatiana- their excursion coordinat.pdfgargtex
 
frepomat was 5 s t with g standant deveson of 2-6 1a) What tecopons ro.pdf
frepomat was 5 s t with g standant deveson of 2-6 1a) What tecopons ro.pdffrepomat was 5 s t with g standant deveson of 2-6 1a) What tecopons ro.pdf
frepomat was 5 s t with g standant deveson of 2-6 1a) What tecopons ro.pdfgargtex
 
Frank and Fred are owners of F Corp- Frank owns 800 shares with a basi.pdf
Frank and Fred are owners of F Corp- Frank owns 800 shares with a basi.pdfFrank and Fred are owners of F Corp- Frank owns 800 shares with a basi.pdf
Frank and Fred are owners of F Corp- Frank owns 800 shares with a basi.pdfgargtex
 
Frepare the Adpating loumal fraties based on the ghen information from.pdf
Frepare the Adpating loumal fraties based on the ghen information from.pdfFrepare the Adpating loumal fraties based on the ghen information from.pdf
Frepare the Adpating loumal fraties based on the ghen information from.pdfgargtex
 
Fountain Corporation is a service company- Fountain has the following.pdf
Fountain Corporation is a service company- Fountain has the following.pdfFountain Corporation is a service company- Fountain has the following.pdf
Fountain Corporation is a service company- Fountain has the following.pdfgargtex
 
Format the result as Percentage with 0 decimal places and copy the for.pdf
Format the result as Percentage with 0 decimal places and copy the for.pdfFormat the result as Percentage with 0 decimal places and copy the for.pdf
Format the result as Percentage with 0 decimal places and copy the for.pdfgargtex
 
Frank and Fred are owners of F Corp- Frank owns 800 shares with a bas.pdf
Frank and Fred are owners of F Corp-  Frank owns 800 shares with a bas.pdfFrank and Fred are owners of F Corp-  Frank owns 800 shares with a bas.pdf
Frank and Fred are owners of F Corp- Frank owns 800 shares with a bas.pdfgargtex
 
fovea capitis Iateral malleolus - gluteal tuberosity lesser trochanter.pdf
fovea capitis Iateral malleolus - gluteal tuberosity lesser trochanter.pdffovea capitis Iateral malleolus - gluteal tuberosity lesser trochanter.pdf
fovea capitis Iateral malleolus - gluteal tuberosity lesser trochanter.pdfgargtex
 
Four hospitals located in one county are cooperating to establish a ce.pdf
Four hospitals located in one county are cooperating to establish a ce.pdfFour hospitals located in one county are cooperating to establish a ce.pdf
Four hospitals located in one county are cooperating to establish a ce.pdfgargtex
 
Four Squares Productions- a firm hired to coordinate the release of th.pdf
Four Squares Productions- a firm hired to coordinate the release of th.pdfFour Squares Productions- a firm hired to coordinate the release of th.pdf
Four Squares Productions- a firm hired to coordinate the release of th.pdfgargtex
 
For your paper this week- answer the following questions- What role do.pdf
For your paper this week- answer the following questions- What role do.pdfFor your paper this week- answer the following questions- What role do.pdf
For your paper this week- answer the following questions- What role do.pdfgargtex
 
Generate the Boston data- -data(Boston- package--MASS-) Which contin.pdf
Generate the Boston data- -data(Boston- package--MASS-)   Which contin.pdfGenerate the Boston data- -data(Boston- package--MASS-)   Which contin.pdf
Generate the Boston data- -data(Boston- package--MASS-) Which contin.pdfgargtex
 
Generate the following printout using the boxstring method IHelloI IWo.pdf
Generate the following printout using the boxstring method IHelloI IWo.pdfGenerate the following printout using the boxstring method IHelloI IWo.pdf
Generate the following printout using the boxstring method IHelloI IWo.pdfgargtex
 
For your selected target organization perform legal reconnaissance- Th.pdf
For your selected target organization perform legal reconnaissance- Th.pdfFor your selected target organization perform legal reconnaissance- Th.pdf
For your selected target organization perform legal reconnaissance- Th.pdfgargtex
 
GENERAL QUESTIONS 1- Assume a crime has been committed- Bodily fluids.pdf
GENERAL QUESTIONS 1- Assume a crime has been committed- Bodily fluids.pdfGENERAL QUESTIONS 1- Assume a crime has been committed- Bodily fluids.pdf
GENERAL QUESTIONS 1- Assume a crime has been committed- Bodily fluids.pdfgargtex
 
Gene S controls the sharpness of spines in a type of cactus- Cacti wit.pdf
Gene S controls the sharpness of spines in a type of cactus- Cacti wit.pdfGene S controls the sharpness of spines in a type of cactus- Cacti wit.pdf
Gene S controls the sharpness of spines in a type of cactus- Cacti wit.pdfgargtex
 

More from gargtex (20)

From 1979 to 2012 - annual Arctic sea ice extent has stayed the same d.pdf
From 1979 to 2012 - annual Arctic sea ice extent has stayed the same d.pdfFrom 1979 to 2012 - annual Arctic sea ice extent has stayed the same d.pdf
From 1979 to 2012 - annual Arctic sea ice extent has stayed the same d.pdf
 
From April to July 2018- the number of employed youth 16 to 24 years o.pdf
From April to July 2018- the number of employed youth 16 to 24 years o.pdfFrom April to July 2018- the number of employed youth 16 to 24 years o.pdf
From April to July 2018- the number of employed youth 16 to 24 years o.pdf
 
Foutney Incorporated has provided the following data for the month of.pdf
Foutney Incorporated has provided the following data for the month of.pdfFoutney Incorporated has provided the following data for the month of.pdf
Foutney Incorporated has provided the following data for the month of.pdf
 
Freshwater fishes need to get rid of excess water (which -wants- to fl.pdf
Freshwater fishes need to get rid of excess water (which -wants- to fl.pdfFreshwater fishes need to get rid of excess water (which -wants- to fl.pdf
Freshwater fishes need to get rid of excess water (which -wants- to fl.pdf
 
Frenzied cruise vacationers besiege Tatiana- their excursion coordinat.pdf
Frenzied cruise vacationers besiege Tatiana- their excursion coordinat.pdfFrenzied cruise vacationers besiege Tatiana- their excursion coordinat.pdf
Frenzied cruise vacationers besiege Tatiana- their excursion coordinat.pdf
 
frepomat was 5 s t with g standant deveson of 2-6 1a) What tecopons ro.pdf
frepomat was 5 s t with g standant deveson of 2-6 1a) What tecopons ro.pdffrepomat was 5 s t with g standant deveson of 2-6 1a) What tecopons ro.pdf
frepomat was 5 s t with g standant deveson of 2-6 1a) What tecopons ro.pdf
 
Frank and Fred are owners of F Corp- Frank owns 800 shares with a basi.pdf
Frank and Fred are owners of F Corp- Frank owns 800 shares with a basi.pdfFrank and Fred are owners of F Corp- Frank owns 800 shares with a basi.pdf
Frank and Fred are owners of F Corp- Frank owns 800 shares with a basi.pdf
 
Frepare the Adpating loumal fraties based on the ghen information from.pdf
Frepare the Adpating loumal fraties based on the ghen information from.pdfFrepare the Adpating loumal fraties based on the ghen information from.pdf
Frepare the Adpating loumal fraties based on the ghen information from.pdf
 
Fountain Corporation is a service company- Fountain has the following.pdf
Fountain Corporation is a service company- Fountain has the following.pdfFountain Corporation is a service company- Fountain has the following.pdf
Fountain Corporation is a service company- Fountain has the following.pdf
 
Format the result as Percentage with 0 decimal places and copy the for.pdf
Format the result as Percentage with 0 decimal places and copy the for.pdfFormat the result as Percentage with 0 decimal places and copy the for.pdf
Format the result as Percentage with 0 decimal places and copy the for.pdf
 
Frank and Fred are owners of F Corp- Frank owns 800 shares with a bas.pdf
Frank and Fred are owners of F Corp-  Frank owns 800 shares with a bas.pdfFrank and Fred are owners of F Corp-  Frank owns 800 shares with a bas.pdf
Frank and Fred are owners of F Corp- Frank owns 800 shares with a bas.pdf
 
fovea capitis Iateral malleolus - gluteal tuberosity lesser trochanter.pdf
fovea capitis Iateral malleolus - gluteal tuberosity lesser trochanter.pdffovea capitis Iateral malleolus - gluteal tuberosity lesser trochanter.pdf
fovea capitis Iateral malleolus - gluteal tuberosity lesser trochanter.pdf
 
Four hospitals located in one county are cooperating to establish a ce.pdf
Four hospitals located in one county are cooperating to establish a ce.pdfFour hospitals located in one county are cooperating to establish a ce.pdf
Four hospitals located in one county are cooperating to establish a ce.pdf
 
Four Squares Productions- a firm hired to coordinate the release of th.pdf
Four Squares Productions- a firm hired to coordinate the release of th.pdfFour Squares Productions- a firm hired to coordinate the release of th.pdf
Four Squares Productions- a firm hired to coordinate the release of th.pdf
 
For your paper this week- answer the following questions- What role do.pdf
For your paper this week- answer the following questions- What role do.pdfFor your paper this week- answer the following questions- What role do.pdf
For your paper this week- answer the following questions- What role do.pdf
 
Generate the Boston data- -data(Boston- package--MASS-) Which contin.pdf
Generate the Boston data- -data(Boston- package--MASS-)   Which contin.pdfGenerate the Boston data- -data(Boston- package--MASS-)   Which contin.pdf
Generate the Boston data- -data(Boston- package--MASS-) Which contin.pdf
 
Generate the following printout using the boxstring method IHelloI IWo.pdf
Generate the following printout using the boxstring method IHelloI IWo.pdfGenerate the following printout using the boxstring method IHelloI IWo.pdf
Generate the following printout using the boxstring method IHelloI IWo.pdf
 
For your selected target organization perform legal reconnaissance- Th.pdf
For your selected target organization perform legal reconnaissance- Th.pdfFor your selected target organization perform legal reconnaissance- Th.pdf
For your selected target organization perform legal reconnaissance- Th.pdf
 
GENERAL QUESTIONS 1- Assume a crime has been committed- Bodily fluids.pdf
GENERAL QUESTIONS 1- Assume a crime has been committed- Bodily fluids.pdfGENERAL QUESTIONS 1- Assume a crime has been committed- Bodily fluids.pdf
GENERAL QUESTIONS 1- Assume a crime has been committed- Bodily fluids.pdf
 
Gene S controls the sharpness of spines in a type of cactus- Cacti wit.pdf
Gene S controls the sharpness of spines in a type of cactus- Cacti wit.pdfGene S controls the sharpness of spines in a type of cactus- Cacti wit.pdf
Gene S controls the sharpness of spines in a type of cactus- Cacti wit.pdf
 

Recently uploaded

Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...ZurliaSoop
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structuredhanjurrannsibayan2
 
latest AZ-104 Exam Questions and Answers
latest AZ-104 Exam Questions and Answerslatest AZ-104 Exam Questions and Answers
latest AZ-104 Exam Questions and Answersdalebeck957
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxEsquimalt MFRC
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentationcamerronhm
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...Nguyen Thanh Tu Collection
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - Englishneillewis46
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfNirmal Dwivedi
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfDr Vijay Vishwakarma
 
Tatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsTatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsNbelano25
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxannathomasp01
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxUmeshTimilsina1
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17Celine George
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 

Recently uploaded (20)

Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
latest AZ-104 Exam Questions and Answers
latest AZ-104 Exam Questions and Answerslatest AZ-104 Exam Questions and Answers
latest AZ-104 Exam Questions and Answers
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
Tatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsTatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf arts
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptx
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 

For your selected target organization perform research and examine phy.pdf

  • 1. For your selected target organization perform research and examine physical security of your target and social engineering tactics you might use against your target. Identify important vulnerabilities for physical security and social engineering. Create a document in which you summarize in 1-3 sentence your findings. Then for each vulnerability you identify, name it, provide a description, provide information on how this vulnerability can be exploited, and describe what could happen (consequences) if an attacker exploited this vulnerability. Consider the following attributes as you assess the seriousness of each vulnerability, and rate each one HIGH, MEDIUM, or LOW risk, and briefly (1 sentence) explain your rating. Confidentiality: (can attacker access information that should not be disclosed, and if so, how much?) Integrity: (can attacker modify system files or information, and if so, how much?) Availability: (can an attacker reduce performance of system or interrupt availability of this resource, and if so, how much?) Access Complexity (how skilled does an attacker need to be, or how much special access would they need, in order to exploit this vulnerability