Describe the description of penetration testing

Assignment Help Computer Engineering
Reference no: EM132589444

Assignment: Refer to NIST SP 800-53 (Rev. 4) for the 18 candidate security control families and associated security controls.

Security Assessment must be incorporated into the Software Development Life Cycle (SDLC) in order to be a secure, integrated process. Testing of selected security controls ensures that applications meet business requirements, function as planned, and protect associated data securely from attack. A security assessment of the targeted environment identifies vulnerabilities that may cause a security breach and specifies the security controls that mitigate the vulnerabilities.

For this assignment, use the organization you chose in Week 1.

Part I: Mapping Vulnerabilities to Security Controls

Choose 5 distinct security control families as specified in NIST SP 800-53 (Rev. 4) that are most applicable to your organization's known vulnerabilities.

Create a 1-page spreadsheet in Microsoft Excel that identifies the following criteria for each family:

• Control ID

• Control Name

• Vulnerability

• Recommended mitigation (refer to your Week 3 assignment; refine them for this mitigation)

Part II: Security Controls Testing

Provide a 2- to 3-page table in Microsoft Word including each family, and describe the testing procedure that will mitigate the vulnerability. Annotate whether the testing procedure is an interview, observation, technical test, or a combination.

Part III: Penetration Testing and Vulnerability Scanning

Provide a 1-page description of penetration testing and vulnerability scanning processes.

Describe how they are used as part of the organization's testing and assessment strategy.

Format your citations according to APA guidelines.

Reference no: EM132589444

Questions Cloud

Create income statements for the year ended Dec : Bio Tech manufactures and sells surgical mask. Create income statements for the year ended Dec 31, 2018 based on both marginal and absorption costing
How should purchase the bond at the current market price : What is the value of the bonds to you given your required rate of return? Should you purchase the bond at the current market price?
Dscribe the data collection techniques : Summarize 3 data collection techniques (Interviews, Surveys, Observations, Focus Groups, etc.). Compare and contrast the 3 data collection techniques.
Calculate the discounted selling price : Pete's Wheels n' Spokes has a rate of markup on cost of 25% on a model of bikes. Calculate the discounted selling price
Describe the description of penetration testing : Security Assessment must be incorporated into the Software Development Life Cycle (SDLC) in order to be a secure, integrated process. Testing of selected.
How does that item impacted net income : How does that item impacted net income (or net loss) and why is there an adjustment necessary to determine cash from operations
Draw the graph breakeven point of capital structure : What is your recommendation in relation to EPS and capital structure based on the given data. draw the graph breakeven point of capital structure
Show the journal entries for the mentioned transactions : On April 1, 2017, XYZ Limited sold a freehold property to another company, STU Limited. Show the journal entries for the mentioned transactions
Explain differences between the direct and indirect methods : Question - Explain the differences between the direct and indirect methods for preparing the statement of cash flows

Reviews

Write a Review

Computer Engineering Questions & Answers

  Explain the social engineering concerns in detail

Imagine a scenario where Jane, an administrative employee of a company, receives a call from James, the company's security administrator.

  Setup and structure of the program

You may wish create separate Guest, Room and potentially Booking classes as part of your implementations, but you do not have to

  Write application that will enable you to display ph level

Write an application that will enable you to display an aquarium's pH level. The pH is a measure of the aquarium water's alkalinity and is typically given on a

  Answer the following

What is final value of y after executing the following code.

  What is the power density away from a directive antenna

What is the power density (in Watts) 30 km away from a directive antenna that has a transmitted power of 38 dBm and a directive antenna gain of 24 dB?

  Write public set methods to set values for length and width

Write public set methods to set the values for length and width. Write public get methods to retrieve the values for length and width.

  How does the behavior of dbscan and k-means differ on

Suppose you are given two sets of 100 points that fall within the unit square. One set of points (a) is arranged so that the points are uniformly spaced.

  List them out in decimal notation

Using the addresses listed below - Give the following information and Subnet ID - along with all subnets available for use - List them out in decimal notation

  How many sets of numbers would you like to be displayed

A separate function should choose the first five numbers and also check that there are no repeats. You must make sure there are no repeats!

  Describe the program development cycle

Describe the importance of using a structured, modular approach when creating program requirements, design, and code.

  What is a regular expression describes the grammar g

Construct a DFA that accepts/recognizes, strings derived from the grammar G with production rules.

  How many prefetches need to be outstanding

How many prefetches need to be outstanding

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd