Explore the US-CERT page or choose a software vendor and explore how they report vulnerabilities.

Explore the US-CERT page or choose a software vendor and explore how they report vulnerabilities.
September 15, 2020 Comments Off on Explore the US-CERT page or choose a software vendor and explore how they report vulnerabilities. Uncategorized Assignment-help
Words: 226
Pages: 1
Subject: Uncategorized

1.Develop a social engineering attack strategy of your professor. NOTE: This is NOT a real attack – there will be no implementation 🙂 Describe what you believe would be an effective strategy against your professor to elicit confidential/ protected information? Why do you think this approach would succeed? 2.Reverse the target – consider yourself and the information footprint you leave behind. Conduct a search on yourself and what information publicly exists out there about you that can be used to profile you and get you to divulge sensitive information. In an abstract way, describe what you found out? Were you surprised by how much/ how little you found? What could you do to better protect your information? 3. Identify and describe an attack strategy used by hackers. How can it be mitigated? If possible, bring in an example of when this attack strategy was successful and how the organization responded. 4.Explore the US-CERT page or choose a software vendor and explore how they report vulnerabilities. How can you integrate this source into your vulnerability and threat awareness strategy? -In addition to these questions, you are encouraged to add other questions, provide links to new content that you feel helps you understand the course material, and/ or bring in current events that are relevant to the module topic. Just make sure you explain how it connects and provide the reference link!