"Vulnerability" Essays and Research Papers

Sort By:
Satisfactory Essays
Good Essays
Better Essays
Powerful Essays
Best Essays
Page 2 of 50 - About 500 Essays
  • Good Essays

    Assessment Worksheet Performing a Vulnerability Assessment CSS150-1502A-02 : Introduction to Computer Security Course Name and Number: _____________________________________________________ Johnathan McMullen Student Name: ________________________________________________________________ Stephen Osborne Instructor Name: ______________________________________________________________ Lab Due Date: ________________________________________________________________ Overview In this lab‚ you used Nmap commands

    Premium Computer security Security Operating system

    • 652 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    mobile

    • 2906 Words
    • 12 Pages

    Android security model Methodology Plan 1 Context and objectives 2 Android introduction 3 Android security model 4 Methodology 5 Toward a backdoor without permission 6 Post-exploitation 7 Scope of the vulnerabilities 8 Conclusion Toward a backdoor without permission Post-exploitation Android introduction Android security model Methodology Toward a backdoor without permission Context and objectives Why Android? Most used mobile

    Premium Vulnerability Access control list Security

    • 2906 Words
    • 12 Pages
    Powerful Essays
  • Better Essays

    Identify Risks‚ Threats‚ and Vulnerabilities of Social Networks and Web Applications By BARRY S KREMBS II February 2013 Certification Statement Title of Assignment: Identify Risks‚ Threats‚ and Vulnerabilities of Social Networks and Web Applications CERTIFICATION OF AUTHORSHIP: I certify that I am the author of this paper/project and that any assistance I received in its preparation is fully acknowledged and disclosed in the paper. I have also cited any sources from which I used data

    Premium Security Risk Computer security

    • 1564 Words
    • 7 Pages
    Better Essays
  • Satisfactory Essays

    a user 2. Disgruntled employee sabotage 3. Download of non-business video using the Internet to an employer-owned computer 4. Malware infection of a user’s laptop 5. Unauthorized physical access to the LAN 6.  LAN server operating system vulnerabilities 7.  WAN Denial of Service (DoS) or Distributed Denial of Service (DDoS) attacks 8. WAN eavesdropping 9. Errors and weaknesses of network router‚ firewall‚ and network appliance configuration file The basic strategies of attack surface reduction

    Premium Security Computer security Risk

    • 348 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    destroy the economic‚ social and cultural life of people. In contemporary academia‚ disasters are seen as the consequence of inappropriatelymanaged risk. These risks are the product of a combination of both hazard/s and vulnerability. Hazards that strike in areas with low vulnerability will never become disasters‚ as is the case in uninhabited regions.[1] Developing countries suffer the greatest costs when a disaster hits – more than 95 percent of all deaths caused by disasters occur in developing

    Premium Hazard Natural disaster Hazards

    • 712 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Disaster Plan

    • 1319 Words
    • 6 Pages

    Disaster Plan Emanuel Alcime IT240 August 28‚ 2011 Axia College Disaster Plan My name is Emanuel and I am an IT/network consultant‚ I was hired The IST Department of XYZ Computers to create a disaster plan for the company. Now‚ the average person would think is there hurricane‚ title wave‚ or a tornado about to hit the company; if so why in the heck would the company need an informational technology/networking consultant to create a disaster plan. Well lucky for me it is not that type

    Premium Backup Computer network Vulnerability

    • 1319 Words
    • 6 Pages
    Better Essays
  • Good Essays

    Notes

    • 1370 Words
    • 6 Pages

    gloves. The company’s HR department had been experiencing issues with payroll even though the company never used any form of fraud. The company decided to put in place a mechanism dealing with vulnerability assessment‚ as well as a strategy to check the company’s network system to assess any form of vulnerabilities which could allow any external unauthorized access to the facility. In the past‚ the company had experienced a case of malware infection which nearly interfered with network system‚ almost

    Premium Computer security Security Information security

    • 1370 Words
    • 6 Pages
    Good Essays
  • Better Essays

    conservative response to managing disasters we currently use that focuses solely on the physical factors. (Reference the lecture here). Vulnerability due to power inequalities within society impacts the damage caused‚ and to whom‚ from these natural hazards. The social construction of natural disasters results from power inequalities in society that leads to vulnerability of certain groups. Within society we construct categories‚ for example by class or gender‚ which are more exposed to risk (McLaughlin

    Premium Global warming Hazard Natural disaster

    • 1343 Words
    • 6 Pages
    Better Essays
  • Better Essays

    project

    • 914 Words
    • 4 Pages

    and one software weakness or‚ b) one hardware and one policy weakness or‚ c) one software and one policy weakness. You must define the asset or policy with sufficient detail to justify your assessment. Your assessment must include: the vulnerability associated with the asset or policy the possible threats against the asset or policy the likelihood that the threat will occur (risk) the consequences to mission critical business processes should the threat occur how the organization’s

    Premium Rachel Marco Risk

    • 914 Words
    • 4 Pages
    Better Essays
  • Powerful Essays

    Global Information Assurance Certification Paper Copyright SANS Institute Author Retains Full Rights This paper is taken from the GIAC directory of certified professionals. Reposting is not permited without express written permission. Interested in learning more? Check out the list of upcoming events offering "Security Essentials Bootcamp Style (Security 401)" at http://www.giac.org/registration/gsec Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46 Abhay Sadwelkar SANS

    Premium Security Risk Vulnerability

    • 4239 Words
    • 17 Pages
    Powerful Essays
Page 1 2 3 4 5 6 7 8 9 50