Reference no: EM133171428
Vulnerability Audit and Assessment - Analysis and Plan
Learning Outcome 1: Identify and analyse security threats and vulnerabilities in network systems and determine appropriate methodologies, tools and techniques to manage and/or solve them.
Learning Outcome 2: Design and critically appraise computer programs and systems to produce solutions that help manage and audit risk and security issues.
Assignment Topic
You have been tasked by an organisation to evaluate their website (provided in Unit 1) and produce an analysis document. It should consist of:
• Details of possible security vulnerabilities.
• A list of standards appropriate to their business and any non-compliance against those standards.
• A summary of recommendations and potential mitigations that could be used to ameliorate any risks. These should be ordered by importance.
Your main conclusions will be presented in an executive summary, due at the end of Unit 6.
For this this first assessment, you will need to produce an analysis document that promotes the benefit of what you will be doing for the business and sets a baseline for the subsequent scans to be evaluated against.
Your analysis document to your client should cover the following requirements.
Assignment Breakdown
The assignment breakdown is highlighted below, to be reviewed alongside the grading criteria in Module Resources.
Knowledge and Understanding, weighted at 25%:
• A baseline assessment of the website, based on academic research.
• A list of potential security challenges based on research/review.
Application of Knowledge, weighted at 25%:
• A list of the tools you will use, justifications for why you selected the tools.
• A list of any (potential) impacts on normal operations caused by using the tools.
• A list of assumptions and limitations of the tools and outputs produced.
• A timeline for the completion of the assessment tests and evaluation.
Presentation and Structure of your work, weighted at 25%:
• Includes spelling, style, evidence of proofreading, correct use (and format) of citations and references.
It is recommended you use tables and bullet-point lists to stay within the word count.
Please note: appendices should not be used to extend the core report as reports should stand alone, complete and concise, without the appendices. They should only be used if required, and only for supplementary and/ or supporting information. One key part of the exercises in this module is the need to be to be able to express ideas succinctly, concisely and with necessary brevity.
Attachment:- Vulnerability Audit and Assessment.rar