Classifications of threats and vulnerabilities


Assignment:

Final Vulnerability Assessment Report

Maria Sosa is depending on you, the chief information security officer at your organization, to provide her and other executive-level stockholders with a final vulnerability assessment report. This thorough report should be presented with your findings and recommendations.

Final Vulnerability Assessment Report (seven to 10 page report using this template: Assignment 7, Steps 11 and 12) This report should include the following components:

• Title Page

o Include:

For whom you are preparing the document, the title, the date prepared, and your name as the preparer of the document

• Table of Contents

o with all sections

• Overview (introduction and purpose)

o Include mission-critical aspects of current organizational processes:

  • personnel
  • physical security
  • network security
  • cybersecurity

• Scope of Work (one-page report: Assignment 1, Steps 1 and 2)

o Include identified security threats, risks, and vulnerabilities within the organization from the preliminary classification of mission-critical aspects

• Work Breakdown Structure (spreadsheet: Assignment 2, Step 3)

o Include key elements that need to be tested and analyzed:

  • internal threats
  • external threats
  • existing security measures
  • compliance requirements

• Threats and Vulnerabilities Report (two to three page report: Assignment 3, Steps 4-6)

o Include:

  • explanation of threats and vulnerabilities
  • classifications of threats and vulnerabilities
  • prioritizations of threats and vulnerabilities

• Lessons Learned Report (two to three page report: Assignment 6, Steps 9 and 10)

o Include:

  • reviewed and recorded findings
  • consider the report's approach including:
  • factors
  • assessment completion
  • next steps
  • other issues to address

• Network Analysis Tools Report (one to two page report: Assignment 4, Step 7--include as Appendix A)

o Include comprehensive recommendations of all components within each key element that should be tested and analyzed:

  • internal threats
  • external threats
  • existing security measures
  • compliance requirements

• Vulnerability Assessment Matrix (one-page matrix using template: Assignment 5, Step 8--include as Appendix B)

o Assess vulnerabilities of your organization

Attachment:- Work Breakdown Structure.rar

Solution Preview :

Prepared by a verified Expert
Management Information Sys: Classifications of threats and vulnerabilities
Reference No:- TGS03160552

Now Priced at $120 (50% Discount)

Recommended (90%)

Rated (4.3/5)