Discuss the importance of vulnerability management

Assignment Help Basic Computer Science
Reference no: EM132390886

1. Discussion

Vulnerability Management Project

Discuss the importance of vulnerability management and ongoing vulnerability management planning. Describe challenges from management and other IT professionals that a security professional might encounter in developing and implementing a vulnerability management plan.

Assignment 1

Performing a Vulnerability Assessment

Overview

There are many important mantras in the information security and assurance space, including, we can't protect what we don't know we have. One of the next steps after we know what we need to protect is to learn where we are vulnerable on those assets we need to protect. One of the common ways to do this is performing vulnerability assessments on our assets and developing strategies for managing the risk that result from those vulnerabilities.

In this assignment you complete the Performing a Vulnerability Assessment lab and write policies for Vulnerability and Patch Management.
Preparation

Do the following:

• Download the Assignment X Template. Use this Word template for your assignment submission.

• Review the Course Security Scenario document found in the Resources for context when writing your security policies in Part 2.

Part 1 - Complete All of Sections 1 and 2 of the Performing a Vulnerability Assessment Lab

Note: not all sections mentioned in the lab's directions are required for this assignment.

Do the following:

Complete "Section 1: Hands-on Demonstration."

o Part 1 Steps 10, 16 and 20.

Complete "Section 2: Applied Learning."

o Part 1 Steps 6, 11 and 15.

Based on the specific actions taken in the lab, compare and contrast the information received from Nessus and Nmap and indicate which you believe to be more valuable and why.

Part 2 - Security Planning: Vulnerability and Patch Management

Create the following security policies for the company described in the Course Security Scenario. State any assumptions that you make, or details that might add depth, texture, or provide a foundation for your policies. Your goal is to create effective policies that represent modern systems assurance security practices and planning.

• Vulnerability Management (1 page).

• Patch Management (1-2 pages).

Consider the following scoring guide criteria as you complete your assignment:

• Write a vulnerability management policy that is appropriate for the Course Security Scenario.

• Write an application Patch Management policy that is appropriate for the Course Security Scenario.

• Compare and contrast the information received from Nessus and Nmap.

Resources

• Course Security Scenario.

• Assignment Template.

Attachment:- Information Technology.rar

Attachment:- Assignment template.rar

Reference no: EM132390886

Questions Cloud

What are main operations performance objectives for mcdonald : How has competition to McDonald's changed over its existence? What are the main operations performance objectives for McDonald's?
What purpose does performance appraisal serve : What purpose does a performance appraisal serve? What are some key ideas to remember when conducting a performance appraisal?
Explain differences between physical and protective barriers : Explain differences between physical and protective barriers.What are two major categories of protective barriers?When should protective barriers be established
The topic of color can be minefield : The topic of color can be a minefield. The judgement involved with selecting the right amount of color for a particular application can be daunting.
Discuss the importance of vulnerability management : Discuss the importance of vulnerability management and ongoing vulnerability management planning. Performing a Vulnerability Assessment
Sustaining business continuity and disaster recovery : Some anticipated challenges that maybe faced when managing and sustaining business continuity and disaster recovery.
Create high-level Visio diagram to accompany your proposal : Create a high-level Visio diagram to accompany your proposal that shows the layout of your software.
What is disaster recovery plan and business continuity plan : What is the difference between a "Disaster Recovery Plan and Business Continuity Plan?" What is Disaster Recovery Plan. What is Business Continuity Plan.
Security needs of small businesses : Are security needs of small businesses different than those of a larger corporation? Security needs overall are the same for both small and large business

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd