SlideShare a Scribd company logo
For your selected target organization perform research and examine physical security of your
target and social engineering tactics you might use against your target. Identify important
vulnerabilities for physical security and social engineering.
Create a document in which you summarize in 1-3 sentence your findings.
Then for each vulnerability you identify, name it, provide a description, provide information on
how this vulnerability can be exploited, and describe what could happen (consequences) if an
attacker exploited this vulnerability.
Consider the following attributes as you assess the seriousness of each vulnerability, and rate
each one HIGH, MEDIUM, or LOW risk, and briefly (1 sentence) explain your rating.
Confidentiality: (can attacker access information that should not be disclosed, and if so, how
much?)
Integrity: (can attacker modify system files or information, and if so, how much?)
Availability: (can an attacker reduce performance of system or interrupt availability of this
resource, and if so, how much?)
Access Complexity (how skilled does an attacker need to be, or how much special access would
they need, in order to exploit this vulnerability

More Related Content

Similar to For your selected target organization perform research and examine phy.pdf

A Behavior Based Intrusion Detection System Using Machine Learning Algorithms
A Behavior Based Intrusion Detection System Using Machine Learning AlgorithmsA Behavior Based Intrusion Detection System Using Machine Learning Algorithms
A Behavior Based Intrusion Detection System Using Machine Learning Algorithms
CSCJournals
 
WEEK 3 ESSAY QUESTIONS Instructions Answer all questions .docx
WEEK 3 ESSAY QUESTIONS Instructions Answer all questions .docxWEEK 3 ESSAY QUESTIONS Instructions Answer all questions .docx
WEEK 3 ESSAY QUESTIONS Instructions Answer all questions .docx
cockekeshia
 
Research Paper on STRIDEPresented By.docx
Research Paper on STRIDEPresented By.docxResearch Paper on STRIDEPresented By.docx
Research Paper on STRIDEPresented By.docx
ronak56
 
Threats vs. Vulnerabilities
Threats vs. Vulnerabilities Threats vs. Vulnerabilities
Threats vs. Vulnerabilities
Roger Johnston
 
Threat modelling
Threat modellingThreat modelling
Threat modelling
Rajeev Venkata
 
Octav ethreat profiles
Octav ethreat profilesOctav ethreat profiles
Octav ethreat profiles
Francis Esquivel Cuenca
 
TAXONOMY BASED INTRUSION ATTACKS AND DETECTION MANAGEMENT SCHEME IN PEER-TOPE...
TAXONOMY BASED INTRUSION ATTACKS AND DETECTION MANAGEMENT SCHEME IN PEER-TOPE...TAXONOMY BASED INTRUSION ATTACKS AND DETECTION MANAGEMENT SCHEME IN PEER-TOPE...
TAXONOMY BASED INTRUSION ATTACKS AND DETECTION MANAGEMENT SCHEME IN PEER-TOPE...
IJNSA Journal
 
Write the questions followed by your answers.1.Using the web.docx
Write the questions followed by your answers.1.Using the web.docxWrite the questions followed by your answers.1.Using the web.docx
Write the questions followed by your answers.1.Using the web.docx
rochellwa9f
 
PPT0-Computer Security Concepts.pptx
PPT0-Computer Security Concepts.pptxPPT0-Computer Security Concepts.pptx
PPT0-Computer Security Concepts.pptx
PiBits
 
02-overview.pptx
02-overview.pptx02-overview.pptx
02-overview.pptx
EmanAzam
 
Chapter 1 overview
Chapter 1 overviewChapter 1 overview
Chapter 1 overview
dr_edw777
 
Threat Modelling and managed risks for medical devices
Threat Modelling and managed risks for medical devicesThreat Modelling and managed risks for medical devices
Threat Modelling and managed risks for medical devices
Frédéric Sagez
 
Automated Emerging Cyber Threat Identification and Profiling Based on Natural...
Automated Emerging Cyber Threat Identification and Profiling Based on Natural...Automated Emerging Cyber Threat Identification and Profiling Based on Natural...
Automated Emerging Cyber Threat Identification and Profiling Based on Natural...
Shakas Technologies
 
((Anatomy of a Security IncidentAttack)) will survey current threat.docx
((Anatomy of a Security IncidentAttack)) will survey current threat.docx((Anatomy of a Security IncidentAttack)) will survey current threat.docx
((Anatomy of a Security IncidentAttack)) will survey current threat.docx
ajoy21
 
What is the process of Vulnerability Assessment and Penetration Testing.pdf
What is the process of Vulnerability Assessment and Penetration Testing.pdfWhat is the process of Vulnerability Assessment and Penetration Testing.pdf
What is the process of Vulnerability Assessment and Penetration Testing.pdf
ElanusTechnologies
 
Network Threats and Attacks SubscribeYou have now learne.docx
Network Threats and Attacks SubscribeYou have now learne.docxNetwork Threats and Attacks SubscribeYou have now learne.docx
Network Threats and Attacks SubscribeYou have now learne.docx
kendalfarrier
 
20160831_app_storesecurity_Seminar
20160831_app_storesecurity_Seminar20160831_app_storesecurity_Seminar
20160831_app_storesecurity_Seminar
Jisoo Park
 
Answer the following questions. Each question response should be at .docx
Answer the following questions. Each question response should be at .docxAnswer the following questions. Each question response should be at .docx
Answer the following questions. Each question response should be at .docx
spoonerneddy
 
Make sure questions and references are included! Determine how s.docx
Make sure questions and references are included! Determine how s.docxMake sure questions and references are included! Determine how s.docx
Make sure questions and references are included! Determine how s.docx
BetseyCalderon89
 
Introduction to Computer Security
Introduction to Computer SecurityIntroduction to Computer Security
Introduction to Computer Security
Kamal Acharya
 

Similar to For your selected target organization perform research and examine phy.pdf (20)

A Behavior Based Intrusion Detection System Using Machine Learning Algorithms
A Behavior Based Intrusion Detection System Using Machine Learning AlgorithmsA Behavior Based Intrusion Detection System Using Machine Learning Algorithms
A Behavior Based Intrusion Detection System Using Machine Learning Algorithms
 
WEEK 3 ESSAY QUESTIONS Instructions Answer all questions .docx
WEEK 3 ESSAY QUESTIONS Instructions Answer all questions .docxWEEK 3 ESSAY QUESTIONS Instructions Answer all questions .docx
WEEK 3 ESSAY QUESTIONS Instructions Answer all questions .docx
 
Research Paper on STRIDEPresented By.docx
Research Paper on STRIDEPresented By.docxResearch Paper on STRIDEPresented By.docx
Research Paper on STRIDEPresented By.docx
 
Threats vs. Vulnerabilities
Threats vs. Vulnerabilities Threats vs. Vulnerabilities
Threats vs. Vulnerabilities
 
Threat modelling
Threat modellingThreat modelling
Threat modelling
 
Octav ethreat profiles
Octav ethreat profilesOctav ethreat profiles
Octav ethreat profiles
 
TAXONOMY BASED INTRUSION ATTACKS AND DETECTION MANAGEMENT SCHEME IN PEER-TOPE...
TAXONOMY BASED INTRUSION ATTACKS AND DETECTION MANAGEMENT SCHEME IN PEER-TOPE...TAXONOMY BASED INTRUSION ATTACKS AND DETECTION MANAGEMENT SCHEME IN PEER-TOPE...
TAXONOMY BASED INTRUSION ATTACKS AND DETECTION MANAGEMENT SCHEME IN PEER-TOPE...
 
Write the questions followed by your answers.1.Using the web.docx
Write the questions followed by your answers.1.Using the web.docxWrite the questions followed by your answers.1.Using the web.docx
Write the questions followed by your answers.1.Using the web.docx
 
PPT0-Computer Security Concepts.pptx
PPT0-Computer Security Concepts.pptxPPT0-Computer Security Concepts.pptx
PPT0-Computer Security Concepts.pptx
 
02-overview.pptx
02-overview.pptx02-overview.pptx
02-overview.pptx
 
Chapter 1 overview
Chapter 1 overviewChapter 1 overview
Chapter 1 overview
 
Threat Modelling and managed risks for medical devices
Threat Modelling and managed risks for medical devicesThreat Modelling and managed risks for medical devices
Threat Modelling and managed risks for medical devices
 
Automated Emerging Cyber Threat Identification and Profiling Based on Natural...
Automated Emerging Cyber Threat Identification and Profiling Based on Natural...Automated Emerging Cyber Threat Identification and Profiling Based on Natural...
Automated Emerging Cyber Threat Identification and Profiling Based on Natural...
 
((Anatomy of a Security IncidentAttack)) will survey current threat.docx
((Anatomy of a Security IncidentAttack)) will survey current threat.docx((Anatomy of a Security IncidentAttack)) will survey current threat.docx
((Anatomy of a Security IncidentAttack)) will survey current threat.docx
 
What is the process of Vulnerability Assessment and Penetration Testing.pdf
What is the process of Vulnerability Assessment and Penetration Testing.pdfWhat is the process of Vulnerability Assessment and Penetration Testing.pdf
What is the process of Vulnerability Assessment and Penetration Testing.pdf
 
Network Threats and Attacks SubscribeYou have now learne.docx
Network Threats and Attacks SubscribeYou have now learne.docxNetwork Threats and Attacks SubscribeYou have now learne.docx
Network Threats and Attacks SubscribeYou have now learne.docx
 
20160831_app_storesecurity_Seminar
20160831_app_storesecurity_Seminar20160831_app_storesecurity_Seminar
20160831_app_storesecurity_Seminar
 
Answer the following questions. Each question response should be at .docx
Answer the following questions. Each question response should be at .docxAnswer the following questions. Each question response should be at .docx
Answer the following questions. Each question response should be at .docx
 
Make sure questions and references are included! Determine how s.docx
Make sure questions and references are included! Determine how s.docxMake sure questions and references are included! Determine how s.docx
Make sure questions and references are included! Determine how s.docx
 
Introduction to Computer Security
Introduction to Computer SecurityIntroduction to Computer Security
Introduction to Computer Security
 

More from gargtex

From 1979 to 2012 - annual Arctic sea ice extent has stayed the same d.pdf
From 1979 to 2012 - annual Arctic sea ice extent has stayed the same d.pdfFrom 1979 to 2012 - annual Arctic sea ice extent has stayed the same d.pdf
From 1979 to 2012 - annual Arctic sea ice extent has stayed the same d.pdf
gargtex
 
From April to July 2018- the number of employed youth 16 to 24 years o.pdf
From April to July 2018- the number of employed youth 16 to 24 years o.pdfFrom April to July 2018- the number of employed youth 16 to 24 years o.pdf
From April to July 2018- the number of employed youth 16 to 24 years o.pdf
gargtex
 
Foutney Incorporated has provided the following data for the month of.pdf
Foutney Incorporated has provided the following data for the month of.pdfFoutney Incorporated has provided the following data for the month of.pdf
Foutney Incorporated has provided the following data for the month of.pdf
gargtex
 
Freshwater fishes need to get rid of excess water (which -wants- to fl.pdf
Freshwater fishes need to get rid of excess water (which -wants- to fl.pdfFreshwater fishes need to get rid of excess water (which -wants- to fl.pdf
Freshwater fishes need to get rid of excess water (which -wants- to fl.pdf
gargtex
 
Frenzied cruise vacationers besiege Tatiana- their excursion coordinat.pdf
Frenzied cruise vacationers besiege Tatiana- their excursion coordinat.pdfFrenzied cruise vacationers besiege Tatiana- their excursion coordinat.pdf
Frenzied cruise vacationers besiege Tatiana- their excursion coordinat.pdf
gargtex
 
frepomat was 5 s t with g standant deveson of 2-6 1a) What tecopons ro.pdf
frepomat was 5 s t with g standant deveson of 2-6 1a) What tecopons ro.pdffrepomat was 5 s t with g standant deveson of 2-6 1a) What tecopons ro.pdf
frepomat was 5 s t with g standant deveson of 2-6 1a) What tecopons ro.pdf
gargtex
 
Frank and Fred are owners of F Corp- Frank owns 800 shares with a basi.pdf
Frank and Fred are owners of F Corp- Frank owns 800 shares with a basi.pdfFrank and Fred are owners of F Corp- Frank owns 800 shares with a basi.pdf
Frank and Fred are owners of F Corp- Frank owns 800 shares with a basi.pdf
gargtex
 
Frepare the Adpating loumal fraties based on the ghen information from.pdf
Frepare the Adpating loumal fraties based on the ghen information from.pdfFrepare the Adpating loumal fraties based on the ghen information from.pdf
Frepare the Adpating loumal fraties based on the ghen information from.pdf
gargtex
 
Fountain Corporation is a service company- Fountain has the following.pdf
Fountain Corporation is a service company- Fountain has the following.pdfFountain Corporation is a service company- Fountain has the following.pdf
Fountain Corporation is a service company- Fountain has the following.pdf
gargtex
 
Format the result as Percentage with 0 decimal places and copy the for.pdf
Format the result as Percentage with 0 decimal places and copy the for.pdfFormat the result as Percentage with 0 decimal places and copy the for.pdf
Format the result as Percentage with 0 decimal places and copy the for.pdf
gargtex
 
Frank and Fred are owners of F Corp- Frank owns 800 shares with a bas.pdf
Frank and Fred are owners of F Corp-  Frank owns 800 shares with a bas.pdfFrank and Fred are owners of F Corp-  Frank owns 800 shares with a bas.pdf
Frank and Fred are owners of F Corp- Frank owns 800 shares with a bas.pdf
gargtex
 
fovea capitis Iateral malleolus - gluteal tuberosity lesser trochanter.pdf
fovea capitis Iateral malleolus - gluteal tuberosity lesser trochanter.pdffovea capitis Iateral malleolus - gluteal tuberosity lesser trochanter.pdf
fovea capitis Iateral malleolus - gluteal tuberosity lesser trochanter.pdf
gargtex
 
Four hospitals located in one county are cooperating to establish a ce.pdf
Four hospitals located in one county are cooperating to establish a ce.pdfFour hospitals located in one county are cooperating to establish a ce.pdf
Four hospitals located in one county are cooperating to establish a ce.pdf
gargtex
 
Four Squares Productions- a firm hired to coordinate the release of th.pdf
Four Squares Productions- a firm hired to coordinate the release of th.pdfFour Squares Productions- a firm hired to coordinate the release of th.pdf
Four Squares Productions- a firm hired to coordinate the release of th.pdf
gargtex
 
For your paper this week- answer the following questions- What role do.pdf
For your paper this week- answer the following questions- What role do.pdfFor your paper this week- answer the following questions- What role do.pdf
For your paper this week- answer the following questions- What role do.pdf
gargtex
 
Generate the Boston data- -data(Boston- package--MASS-) Which contin.pdf
Generate the Boston data- -data(Boston- package--MASS-)   Which contin.pdfGenerate the Boston data- -data(Boston- package--MASS-)   Which contin.pdf
Generate the Boston data- -data(Boston- package--MASS-) Which contin.pdf
gargtex
 
Generate the following printout using the boxstring method IHelloI IWo.pdf
Generate the following printout using the boxstring method IHelloI IWo.pdfGenerate the following printout using the boxstring method IHelloI IWo.pdf
Generate the following printout using the boxstring method IHelloI IWo.pdf
gargtex
 
For your selected target organization perform legal reconnaissance- Th.pdf
For your selected target organization perform legal reconnaissance- Th.pdfFor your selected target organization perform legal reconnaissance- Th.pdf
For your selected target organization perform legal reconnaissance- Th.pdf
gargtex
 
GENERAL QUESTIONS 1- Assume a crime has been committed- Bodily fluids.pdf
GENERAL QUESTIONS 1- Assume a crime has been committed- Bodily fluids.pdfGENERAL QUESTIONS 1- Assume a crime has been committed- Bodily fluids.pdf
GENERAL QUESTIONS 1- Assume a crime has been committed- Bodily fluids.pdf
gargtex
 
Gene S controls the sharpness of spines in a type of cactus- Cacti wit.pdf
Gene S controls the sharpness of spines in a type of cactus- Cacti wit.pdfGene S controls the sharpness of spines in a type of cactus- Cacti wit.pdf
Gene S controls the sharpness of spines in a type of cactus- Cacti wit.pdf
gargtex
 

More from gargtex (20)

From 1979 to 2012 - annual Arctic sea ice extent has stayed the same d.pdf
From 1979 to 2012 - annual Arctic sea ice extent has stayed the same d.pdfFrom 1979 to 2012 - annual Arctic sea ice extent has stayed the same d.pdf
From 1979 to 2012 - annual Arctic sea ice extent has stayed the same d.pdf
 
From April to July 2018- the number of employed youth 16 to 24 years o.pdf
From April to July 2018- the number of employed youth 16 to 24 years o.pdfFrom April to July 2018- the number of employed youth 16 to 24 years o.pdf
From April to July 2018- the number of employed youth 16 to 24 years o.pdf
 
Foutney Incorporated has provided the following data for the month of.pdf
Foutney Incorporated has provided the following data for the month of.pdfFoutney Incorporated has provided the following data for the month of.pdf
Foutney Incorporated has provided the following data for the month of.pdf
 
Freshwater fishes need to get rid of excess water (which -wants- to fl.pdf
Freshwater fishes need to get rid of excess water (which -wants- to fl.pdfFreshwater fishes need to get rid of excess water (which -wants- to fl.pdf
Freshwater fishes need to get rid of excess water (which -wants- to fl.pdf
 
Frenzied cruise vacationers besiege Tatiana- their excursion coordinat.pdf
Frenzied cruise vacationers besiege Tatiana- their excursion coordinat.pdfFrenzied cruise vacationers besiege Tatiana- their excursion coordinat.pdf
Frenzied cruise vacationers besiege Tatiana- their excursion coordinat.pdf
 
frepomat was 5 s t with g standant deveson of 2-6 1a) What tecopons ro.pdf
frepomat was 5 s t with g standant deveson of 2-6 1a) What tecopons ro.pdffrepomat was 5 s t with g standant deveson of 2-6 1a) What tecopons ro.pdf
frepomat was 5 s t with g standant deveson of 2-6 1a) What tecopons ro.pdf
 
Frank and Fred are owners of F Corp- Frank owns 800 shares with a basi.pdf
Frank and Fred are owners of F Corp- Frank owns 800 shares with a basi.pdfFrank and Fred are owners of F Corp- Frank owns 800 shares with a basi.pdf
Frank and Fred are owners of F Corp- Frank owns 800 shares with a basi.pdf
 
Frepare the Adpating loumal fraties based on the ghen information from.pdf
Frepare the Adpating loumal fraties based on the ghen information from.pdfFrepare the Adpating loumal fraties based on the ghen information from.pdf
Frepare the Adpating loumal fraties based on the ghen information from.pdf
 
Fountain Corporation is a service company- Fountain has the following.pdf
Fountain Corporation is a service company- Fountain has the following.pdfFountain Corporation is a service company- Fountain has the following.pdf
Fountain Corporation is a service company- Fountain has the following.pdf
 
Format the result as Percentage with 0 decimal places and copy the for.pdf
Format the result as Percentage with 0 decimal places and copy the for.pdfFormat the result as Percentage with 0 decimal places and copy the for.pdf
Format the result as Percentage with 0 decimal places and copy the for.pdf
 
Frank and Fred are owners of F Corp- Frank owns 800 shares with a bas.pdf
Frank and Fred are owners of F Corp-  Frank owns 800 shares with a bas.pdfFrank and Fred are owners of F Corp-  Frank owns 800 shares with a bas.pdf
Frank and Fred are owners of F Corp- Frank owns 800 shares with a bas.pdf
 
fovea capitis Iateral malleolus - gluteal tuberosity lesser trochanter.pdf
fovea capitis Iateral malleolus - gluteal tuberosity lesser trochanter.pdffovea capitis Iateral malleolus - gluteal tuberosity lesser trochanter.pdf
fovea capitis Iateral malleolus - gluteal tuberosity lesser trochanter.pdf
 
Four hospitals located in one county are cooperating to establish a ce.pdf
Four hospitals located in one county are cooperating to establish a ce.pdfFour hospitals located in one county are cooperating to establish a ce.pdf
Four hospitals located in one county are cooperating to establish a ce.pdf
 
Four Squares Productions- a firm hired to coordinate the release of th.pdf
Four Squares Productions- a firm hired to coordinate the release of th.pdfFour Squares Productions- a firm hired to coordinate the release of th.pdf
Four Squares Productions- a firm hired to coordinate the release of th.pdf
 
For your paper this week- answer the following questions- What role do.pdf
For your paper this week- answer the following questions- What role do.pdfFor your paper this week- answer the following questions- What role do.pdf
For your paper this week- answer the following questions- What role do.pdf
 
Generate the Boston data- -data(Boston- package--MASS-) Which contin.pdf
Generate the Boston data- -data(Boston- package--MASS-)   Which contin.pdfGenerate the Boston data- -data(Boston- package--MASS-)   Which contin.pdf
Generate the Boston data- -data(Boston- package--MASS-) Which contin.pdf
 
Generate the following printout using the boxstring method IHelloI IWo.pdf
Generate the following printout using the boxstring method IHelloI IWo.pdfGenerate the following printout using the boxstring method IHelloI IWo.pdf
Generate the following printout using the boxstring method IHelloI IWo.pdf
 
For your selected target organization perform legal reconnaissance- Th.pdf
For your selected target organization perform legal reconnaissance- Th.pdfFor your selected target organization perform legal reconnaissance- Th.pdf
For your selected target organization perform legal reconnaissance- Th.pdf
 
GENERAL QUESTIONS 1- Assume a crime has been committed- Bodily fluids.pdf
GENERAL QUESTIONS 1- Assume a crime has been committed- Bodily fluids.pdfGENERAL QUESTIONS 1- Assume a crime has been committed- Bodily fluids.pdf
GENERAL QUESTIONS 1- Assume a crime has been committed- Bodily fluids.pdf
 
Gene S controls the sharpness of spines in a type of cactus- Cacti wit.pdf
Gene S controls the sharpness of spines in a type of cactus- Cacti wit.pdfGene S controls the sharpness of spines in a type of cactus- Cacti wit.pdf
Gene S controls the sharpness of spines in a type of cactus- Cacti wit.pdf
 

Recently uploaded

A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
Jean Carlos Nunes Paixão
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Dr. Vinod Kumar Kanvaria
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
Colégio Santa Teresinha
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
adhitya5119
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
National Information Standards Organization (NISO)
 
Top five deadliest dog breeds in America
Top five deadliest dog breeds in AmericaTop five deadliest dog breeds in America
Top five deadliest dog breeds in America
Bisnar Chase Personal Injury Attorneys
 
DRUGS AND ITS classification slide share
DRUGS AND ITS classification slide shareDRUGS AND ITS classification slide share
DRUGS AND ITS classification slide share
taiba qazi
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
WaniBasim
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
eBook.com.bd (প্রয়োজনীয় বাংলা বই)
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
Academy of Science of South Africa
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
Nicholas Montgomery
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Akanksha trivedi rama nursing college kanpur.
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
amberjdewit93
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
thanhdowork
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
Nguyen Thanh Tu Collection
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
Dr. Mulla Adam Ali
 
Smart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICTSmart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICT
simonomuemu
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
David Douglas School District
 

Recently uploaded (20)

A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
 
Top five deadliest dog breeds in America
Top five deadliest dog breeds in AmericaTop five deadliest dog breeds in America
Top five deadliest dog breeds in America
 
DRUGS AND ITS classification slide share
DRUGS AND ITS classification slide shareDRUGS AND ITS classification slide share
DRUGS AND ITS classification slide share
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
 
Smart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICTSmart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICT
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
 

For your selected target organization perform research and examine phy.pdf

  • 1. For your selected target organization perform research and examine physical security of your target and social engineering tactics you might use against your target. Identify important vulnerabilities for physical security and social engineering. Create a document in which you summarize in 1-3 sentence your findings. Then for each vulnerability you identify, name it, provide a description, provide information on how this vulnerability can be exploited, and describe what could happen (consequences) if an attacker exploited this vulnerability. Consider the following attributes as you assess the seriousness of each vulnerability, and rate each one HIGH, MEDIUM, or LOW risk, and briefly (1 sentence) explain your rating. Confidentiality: (can attacker access information that should not be disclosed, and if so, how much?) Integrity: (can attacker modify system files or information, and if so, how much?) Availability: (can an attacker reduce performance of system or interrupt availability of this resource, and if so, how much?) Access Complexity (how skilled does an attacker need to be, or how much special access would they need, in order to exploit this vulnerability