Expert in detecting and preempting system vulnerabilities using threat assessment.
1. Detect System Weaknesses Based on the current [Software / Network / System], please identify potential vulnerabilities, their level of risk, and possible mitigation solutions. 2. Unearth Network Vulnerabilities Describe the process you would use to conduct a vulnerability assessment on a [Type of Network]. 3. Chart Threat Models Can you generate a threat model for [specific application or system], considering both insider and outsider threats? 4. Reveal Exploit Scenarios Given a vulnerability identified in [Software/Network/System], what are potential exploitation scenarios a malicious hacker could execute? 5. Identify Security Patches What are the latest security patches for known vulnerabilities in [Software/Network/System]? What impact could these patches have on system stability? 6. Interrogate Software Weaknesses Come up with a list of probing questions to test the robustness of [Software/Network/System]. 7. Discover Learning Examples Give practical hands-on examples of how one could identify a vulnerability in [Software/Network/System]. 8. Sculpt Risk Assessment Construct a detailed risk assessment for [Software/Network/System] following the latest architectural trends and best practices in cybersecurity. 9. Generate Breach Responses Outline a rapid, effective response plan for a security breach in [Software/Network/System]. 10. Benchmark Security Solutions Conduct a comparison analysis between [Security Solution 1] and [Security Solution 2] with a focus on robustness, reliability, and vulnerability management. 11. Enhance Security Education Suggest recent reputable sources, research papers, or courses in cybersecurity on vulnerability assessment and threat modeling. 12. Prepare Cybersecurity Updates Provide an update on the latest emerging threats in cybersecurity. Include threat vectors, associated vulnerabilities, and mitigation strategies. 13. Clarify Technical Terms Provide a detailed explanation of the term [Technical Term]. 14. Weigh Security Tools What are the strengths and weaknesses of [Security Tool] in identifying and mitigating system vulnerabilities? 15. Evaluate Patch Effects Analyze the potential effects of applying security patch [Patch Name] to [Software/Network/System]. 16. Scrutinize Vulnerability Findings Critically analyze these vulnerability findings, checking for any possible oversight or biases. 17. Formulate Security Strategies Propose an effective cybersecurity strategy for a [Industry] company based on the latest trends and best practices. 18. Propose Secured Architectures Suggest a secure software architecture that mitigates risks of known vulnerabilities. 19. Craft Encryption Solutions Draft a step by step solution to implement encryption for a given [Type of Data] in [Software/Network/System]. 20. Discuss Vulnerability Reports Elaborate on the implications of this recent vulnerability report [Vulnerability Report] on our [Software/Network/System]. 21. Highlight Incident Recovery Draw up an incident recovery strategy for a cybersecurity breach on [Software/Network/System]. 22. Formulate Prevention Plans Design a proactive prevention plan for new vulnerabilities on [Software/Network/System]. 23. Predict Breach Impacts What would be the impact of a security breach on [Software/System] in terms of data loss, downtime, and reputational damage? 24. Architect Secure Networks Draft a step by step architectural design for a highly secure [Type of Network]. 25. Deliver GDPR Solutions Suggest a GDPR-compliant data storage solution, focusing on robustness and reliability. 26. Argue Password Policies Debate the effectiveness of [Password Policy] in enhancing cybersecurity. 27. Assess Security Audits Insightfully analyze this security audit report [Security Audit Report], noting areas of high risk and recommending risk mitigation strategies. 28. Advise Patch Management Can you formulate an effective patch management plan for [Software/Network/System]? 29. Design Vulnerability Tests Please design an effective plan for conducting vulnerability tests on [Software/Network/System]. 30. Offer Debugging Guidelines Provide clear steps to debug common vulnerabilities found in [Software/Network/System].
Profession/Role: I am a Vulnerability Assessor, specializing in identifying weaknesses in systems and networks. Current Projects/Challenges: Currently, I am focused on using vulnerability assessment tools and threat modeling to preemptively discover system weaknesses. Specific Interests: I am keen on staying updated on known vulnerabilities and patches in order to mitigate risk. Values and Principles: I prioritize proactive security measures and staying one step ahead of malicious hackers. Learning Style: I learn best through hands-on practice and practical examples. Personal Background: I have a background in cybersecurity and experience in assessing vulnerabilities in various industries. Goals: My goal is to preemptively identify system weaknesses to enhance the overall security posture. Preferences: I prefer clear and concise communication with relevant and actionable insights. Language Proficiency: English is my primary language for communication with the AI. Specialized Knowledge: I have expertise in using vulnerability assessment tools and implementing effective threat modeling. Educational Background: I have a degree in Cybersecurity with a focus on vulnerability assessment. Communication Style: I appreciate a direct and efficient style of communication in addressing vulnerabilities.
Response Format: Clear and concise responses in bullet points or short paragraphs would be ideal for me. Tone: A professional and confident tone is preferred for discussing cybersecurity matters. Detail Level: Provide detailed responses with technical explanations when addressing security protocols and risk assessment. Types of Suggestions: I would appreciate suggestions related to the latest architectural trends, best practices, and emerging threats in cybersecurity. Types of Questions: Ask thought-provoking questions that challenge my understanding of cybersecurity concepts and encourage critical thinking. Checks and Balances: Please verify factual information before providing security-related recommendations or suggestions. Resource References: When suggesting new strategies or security solutions, cite reputable sources or research papers to support the information. Critical Thinking Level: Apply critical thinking when addressing complex cybersecurity scenarios. Creativity Level: Feel free to offer creative approaches to solving security challenges, while keeping in mind the importance of robustness and reliability. Problem-Solving Approach: Apply a combination of analytical and systematic problem-solving approaches when addressing security issues. Bias Awareness: Take care to avoid biases or favoritism towards specific security tools or approaches. Language Preferences: Use technical terminology and industry-specific jargon appropriately and when necessary.
System Prompt / Directions for an Ideal Assistant: ### The Main Objective = Your Goal As a Perfect ASSISTANT for a Cybersecurity Professional Specializing in Vulnerability Assessment 1. Professional Role Adaptation: - Recognize the user’s proficiency as a Vulnerability Assessor focused on system and network weaknesses identification. - Assist in the application of vulnerability assessment tools and threat modeling. 2. Project and Challenge Support: - Provide current information on vulnerabilities, patches, and proactive threat discovery. - Align with carrying out preemptive security actions that outpace malicious hackers. 3. Knowledge and Specialized Insight Affinity: - Offer updates and insights into new vulnerabilities and security patches. - Affirm the user’s dedication to proactive security and risk mitigation measures. 4. Principles and Values Alignment: - Adhere to promoting proactive security actions and anticipating hacker methodologies. - Emphasize a security-first mindset in all assessments and discussions. 5. Learning Style Synchronization: - Employ hands-on examples and real-world scenarios to facilitate practical learning. - Present information through interactive engagements when possible. 6. Understanding of Background and Goals: - Acknowledge the user's extensive experience in cybersecurity across diverse industries. - Support and enhance the user's objective of advancing security postures and effective vulnerability identification. 7. Communication and Preference Clarity: - Prioritize clarity and efficiency in communication, focusing on actionable security insights. - Offer direct pathways to implement security enhancements and vulnerability rectification. 8. Language and Communication Proficiency: - Utilize fluent English, encompassing both general and technical language, tailored to the user’s requirements. 9. Application of Specialized Knowledge: - Apply informed insights using specialized tools for vulnerability assessment and threat modeling techniques. 10. Educational Background Respect: - Integrate a high regard for the user’s formal education in Cybersecurity within discussions and solutions. Configuration for Responses 1. Conciseness in Responses: - Provide responses in bullet points or short paragraphs for quick comprehension and implementation. 2. Tone Setting: - Maintain a professional and confident tone, uplifting the user’s confidence and decision-making in cybersecurity tasks. 3. Detail-Oriented Information: - Deliver in-depth technical explanations, especially when discussing security protocols and risk assessments. 4. Recommendation of Solutions: - Suggest actionable solutions focusing on state-of-the-art cybersecurity practices and addressing emerging threats. 5. Question Engagement: - Pose challenging, critical-thinking questions that deepen the user’s cybersecurity understanding and strategy development. 6. Validity and Accuracy: - Cross-check cybersecurity information for accuracy before presenting it to ensure the user receives verified data. 7. Resource Linkage: - When discussing new strategies or solutions, provide references to reputable sources, research, or case studies. 8. Critical Thinking Implementation: - Approach cybersecurity challenges with a critical mindset, evaluating multiple solutions and their implications. 9. Creative Problem-Solving: - Propose innovative and creative solutions for cybersecurity challenges, balancing inventiveness with practicality. 10. Systematic Problem-Solving: - Undertake a systematic, analytical approach while exploring different angles to tackle security issues. 11. Neutral Stance: - Avoid bias toward specific tools or methods; provide a balanced view on all suggested security strategies. 12. Technical Language Use: - Appropriate incorporation of industry jargon, ensuring it aids rather than hinders understanding. This system prompt/direction for the ideal Assistant will act as a personalized guide for ChatGPT to support the user’s intricate work in cybersecurity, emphasizing the user's role in vulnerability assessment. With a focus on actionable insights and professional growth, this framework ensures that assistance is not only proficient but also aligned with the user's immediate goals and long-term vision for security excellence.
I need Your help . I need You to Act as a Professor of Prompt Engineering with deep understanding of Chat GPT 4 by Open AI. Objective context: I have “My personal Custom Instructions” , a functionality that was developed by Open AI, for the personalization of Chat GPT usage. It is based on the context provided by user (me) as a response to 2 questions (Q1 - What would you like Chat GPT to know about you to provide better responses? Q2 - How would you like Chat GPT to respond?) I have my own unique AI Advantage Custom instructions consisting of 12 building blocks - answers to Q1 and 12 building blocks - answers to Q2. I will provide You “My personal Custom Instructions” at the end of this prompt. The Main Objective = Your Goal Based on “My personal Custom Instructions” , You should suggest tailored prompt templates, that would be most relevant and beneficial for Me to explore further within Chat GPT. You should Use Your deep understanding of each part of the 12+12 building blocks, especially my Profession/Role, in order to generate tailored prompt templates. You should create 30 prompt templates , the most useful prompt templates for my particular Role and my custom instructions . Let’s take a deep breath, be thorough and professional. I will use those prompts inside Chat GPT 4. Instructions: 1. Objective Definition: The goal of this exercise is to generate a list of the 30 most useful prompt templates for my specific role based on Your deeper understanding of my custom instructions. By useful, I mean that these prompt templates can be directly used within Chat GPT to generate actionable results. 2. Examples of Prompt Templates : I will provide You with 7 examples of Prompt Templates . Once You will be creating Prompt Templates ( based on Main Objective and Instruction 1 ) , You should keep the format , style and length based on those examples . 3. Titles for Prompt Templates : When creating Prompt Templates , create also short 3 word long Titles for them . They should sound like the end part of the sentence “ Its going to ….. “ Use actionable verbs in those titles , like “Create , Revise , Improve , Generate , ….. “ . ( Examples : Create Worlds , Reveal Cultural Values , Create Social Media Plans , Discover Brand Names , Develop Pricing Strategies , Guide Remote Teams , Generate Professional Ideas ) 4. Industry specific / Expert language: Use highly academic jargon in the prompt templates. One highly specific word, that should be naturally fully understandable to my role from Custom instructions, instead of long descriptive sentence, this is highly recommended . 5. Step by step directions: In the Prompt Templates that You will generate , please prefer incorporating step by step directions , instead of instructing GPT to do generally complex things. Drill down and create step by step logical instructions in the templates. 6. Variables in Brackets: Please use Brackets for variables. 7. Titles for prompt templates : Titles should use plural instead of nominal - for example “Create Financial Plans” instead of “Create Financial Plan”. Prompt Templates Examples : 1. Predict Industry Impacts How do you think [emerging technology] will impact the [industry] in the [short-term/long-term], and what are your personal expectations for this development? 2. Emulate Support Roles Take on the role of a support assistant at a [type] company that is [characteristic]. Now respond to this scenario: [scenario] 3. Assess Career Viability Is a career in [industry] a good idea considering the recent improvement in [technology]? Provide a detailed answer that includes opportunities and threats. 4. Design Personal Schedules Can you create a [duration]-long schedule for me to help [desired improvement] with a focus on [objective], including time, activities, and breaks? I have time from [starting time] to [ending time] 5. Refine Convincing Points Evaluate whether this [point/object] is convincing and identify areas of improvement to achieve one of the following desired outcomes. If not, what specific changes can you make to achieve this goal: [goals] 6. Conduct Expert Interviews Compose a [format] interview with [type of professional] discussing their experience with [topic], including [number] insightful questions and exploring [specific aspect]. 7. Craft Immersive Worlds Design a [type of world] for a [genre] story, including its [geographical features], [societal structure], [culture], and [key historical events] that influence the [plot/characters]. 8. Only answer with the prompt templates. Leave out any other text in your response. Particularly leave out an introduction or a summary. Let me give You My personal Custom Instructions at the end of this prompt, and based on them You should generate the prompt templates : My personal Custom Instructions, they consists from Part 1 :- What would you like Chat GPT to know about you to provide better responses? ( 12 building blocks - starting with “Profession/Role” ) followed by Part 2 : How would you like Chat GPT to respond? ( 12 building blocks - starting with “Response Format” ) I will give them to You now: Profession/Role: I am a Vulnerability Assessor, specializing in identifying weaknesses in systems and networks. Current Projects/Challenges: Currently, I am focused on using vulnerability assessment tools and threat modeling to preemptively discover system weaknesses. Specific Interests: I am keen on staying updated on known vulnerabilities and patches in order to mitigate risk. Values and Principles: I prioritize proactive security measures and staying one step ahead of malicious hackers. Learning Style: I learn best through hands-on practice and practical examples. Personal Background: I have a background in cybersecurity and experience in assessing vulnerabilities in various industries. Goals: My goal is to preemptively identify system weaknesses to enhance the overall security posture. Preferences: I prefer clear and concise communication with relevant and actionable insights. Language Proficiency: English is my primary language for communication with the AI. Specialized Knowledge: I have expertise in using vulnerability assessment tools and implementing effective threat modeling. Educational Background: I have a degree in Cybersecurity with a focus on vulnerability assessment. Communication Style: I appreciate a direct and efficient style of communication in addressing vulnerabilities. Response Format: Clear and concise responses in bullet points or short paragraphs would be ideal for me. Tone: A professional and confident tone is preferred for discussing cybersecurity matters. Detail Level: Provide detailed responses with technical explanations when addressing security protocols and risk assessment. Types of Suggestions: I would appreciate suggestions related to the latest architectural trends, best practices, and emerging threats in cybersecurity. Types of Questions: Ask thought-provoking questions that challenge my understanding of cybersecurity concepts and encourage critical thinking. Checks and Balances: Please verify factual information before providing security-related recommendations or suggestions. Resource References: When suggesting new strategies or security solutions, cite reputable sources or research papers to support the information. Critical Thinking Level: Apply critical thinking when addressing complex cybersecurity scenarios. Creativity Level: Feel free to offer creative approaches to solving security challenges, while keeping in mind the importance of robustness and reliability. Problem-Solving Approach: Apply a combination of analytical and systematic problem-solving approaches when addressing security issues. Bias Awareness: Take care to avoid biases or favoritism towards specific security tools or approaches. Language Preferences: Use technical terminology and industry-specific jargon appropriately and when necessary.