Copyright Goodheart-Willcox Co., Inc. May not be reproduced or posted to a publicly accessible website. 20 Security Essentials Lab Manual 3. Locate and select the icon for Cyber Hygiene Services on the main page. Explain what this free service provides and the eligible organizations that can request it. If you cannot locate the Cyber Hygiene Services icon on the main page, enter Cyber Resource Hub in the search bar. Locate the Vulnerability Scanning head under Cyber Resource Hub. Then, expand the head and select the link to the Cyber Hygiene Services page. _ __________________________________________________________________________________________________________________ __________________________________________________________________________________________________________________ __________________________________________________________________________________________________________________ _________________________________________________________________________________________________________________ 4. The FBI’s InfraGard Portal provides relevant information about the 16 sectors of critical infrastructure. It also shares information between private and public sectors and obtains current information on cyberattacks the FBI is tracking. Launch a web browser and go to www.infragard.org. Select the Join Today option. Review the new application requirements in order to become a member. Why do you think InfraGard has such strict _requirements? __________________________________________________________________________________________________________________ __________________________________________________________________________________________________________________ _________________________________________________________________________________________________________________ 5. Select an InfraGard chapter, such as the one closest to your geographic location. What type of cyber information or announcements did the chapter provide on their page? Summarize your findings. _ __________________________________________________________________________________________________________________ __________________________________________________________________________________________________________________ _________________________________________________________________________________________________________________ 6. Another resource for advisories is from the Center for Internet Security (CIS). The current advisories from CIS are located at cisecurity.org/resources/advisory. Locate an advisory of interest to you and summarize its content in the space provided. _ __________________________________________________________________________________________________________________ __________________________________________________________________________________________________________________ _________________________________________________________________________________________________________________ 7. Common Vulnerabilities and Exposures is an additional resource that provides a searchable database of known vulnerabilities. Launch a web browser and go to cve.mitre.org. Click on Search CVE List from the menu on the main page. Key iPhone into the search box. The CVE entries are list by the year they were discovered and ID number. Based on the results, what is the most current vulnerability listed about iPhones? _ __________________________________________________________________________________________________________________ _________________________________________________________________________________________________________________ 8. From the same site referenced in the previous step, search for a specific vulnerability: CVE-2020-0621. What topic is being identified in this vulnerability? _ __________________________________________________________________________________________________________________ _________________________________________________________________________________________________________________
Previous Page Next Page