- Your task is to gather publicly available information about the computer systems used by Park University. Hardware, software, operating systems, applications, network topology, and personnel are all part of this exercise. In short, you are looking for any information that would be of use to an attacker.
- You may search Parks web site and web sites of related partners.
- You may use a search engine, like Google or Yahoo.
- You may use Internet information stored in various public databases.
- You may NOT do any port scanning.
- You may NOT use information that is only contained in My Park, since that is not publicly available.
- Find 10 different items about Parks information infrastructure
- Summarize which information you found.
- Cite the URL for this information.
- Show what search terms you used or how you found this information.
- Explain whether this item should or should not be publicly available.
- Write a brief summary of how well you think Park protects information about its systems. Be sure to provide evidence to back up your opinions.