Identify potential sources of information that can be used

Assignment Help Computer Engineering
Reference no: EM133663806

Homework

Your boss wants you to draft a two- to three-page vulnerability process and assessment memorandum addressing the main points of a VM process for Mercury USA. You will cover the main elements of a vulnerability management process, tailored to Mercury USA's business in the transportation sector, evaluate the OpenVAS scanning tool, and provide recommendations for mitigating the vulnerabilities found within the OpenVAS report.

The third-party pen tester used the free tool Open Vulnerability Assessment Scanner (OpenVAS) to scan Mercury USA's network. Review the report from the OpenVAS Scan.

As you review the scan, consider some important points from Lesson:

1) Priority

2) Difficulty of implementation

3) Communication/change control

4) Inhibitors to remediation

a) MOUs
b) SLAs
c) Business process interruption
d) Degrading functionality

How Will My Work Be Evaluated?

An important part of your duties as a cybersecurity analyst will involve analyzing data from multiple sources and sensors such as antivirus/antimalware scanners, firewalls, insider threat monitoring systems, intrusion detection/prevention systems, SIEMs, vulnerability scanners, web application scanners, and other tools. You will also process logs from applications, auditing, network infrastructure devices, internet of things (IoT) devices, mobile communications devices, printers, servers, security appliances, and generalized logging collectors like syslog and Windows Event Logs.

As a cybersecurity analyst, you will be considered the subject matter and technical expert. A large part of your work will focus on identifying, analyzing, and mitigating vulnerabilities. For this homework, you are asked to provide your supervisor with a technical evaluation of the organization's vulnerabilities and propose a vulnerability management process. By summarizing your results in a short memorandum, you are showing how you use your technical knowledge to convey your ideas to others in a professional setting. Your ability to express your findings using the right mix of technical detail in a business context using an accepted format is an important workplace skill.

The following evaluation criteria aligned to the competencies will be used:

A. Articulate the main idea and purpose of a communication.
B. Identify potential sources of information that can be used to develop and support ideas.
C. Produce grammatically correct material in standard academic English that supports the communication.
D. Identify the problem to be solved.
E. Gather project requirements to meet stakeholder needs.
F. Formulate policies, processes, and procedures based upon identified business needs.
G. Identify systems for the risk assessment.

Reference no: EM133663806

Questions Cloud

Briefly about evaluation plan : Develop a discussion that informs briefly about an evaluation plan and context of a program and ultimately how it would be used by either program clients
While employer reasonably accommodates : While an employer reasonably accommodates an employee's religious conflict, it is the duty of the employee to
Comprehensive review of the reference materials : Comprehensive review of the reference materials you have utilised - Individual Cover Page with the students Identification (Name and Student Number)
Create a data frame and load the excel or csv file : Create a data frame and load the Excel or CSV file. Create a temp dataset with your main dataset. Perform arithmetic with one of your numeric fields.
Identify potential sources of information that can be used : CT 421- Identify potential sources of information that can be used to develop and support ideas. Identify the problem to be solved.
What is the main function of the mitochondria : What is the main function of the mitochondria within the cells - what would be your hypothesis on how this can happen knowing the function of the mitochondria
What the attacker did stole and wanted : BIS 3004- What the attacker(s) did, stole and wanted? Did organisation pay anything because of the attack? What action did they adopt to avoid further damage?
Job description for entry-level store employee : Use the table below to draft a job description for an Entry-level Store Employee.
Explain the planning process : Explain the planning process that outlines the key elements and strategies for the company to reach the risk management.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd