Identify a vulnerability and a patch management strategy


Assignment Description

In many instances, there is a need for cybersecurity managers to work with the Chief Information Officer (CIO) or Chief Technology Officer (CTO) to identify and protect critical computer systems that require high availability. The cybersecurity managers should identify a viable vulnerability and patch management strategy that addresses these systems as well as the normal computing environment.

Assignment Details

In 500 to 700 words, articulate an overview of the computing environment for an organization that has normal and critical production computing systems. Identify a vulnerability and a patch management strategy to safeguard this computing environment. Take into consideration the factors discussed in Unit 2 DB..

Your submission should address the following areas:

• An overview of the organization's computing environment and networks

• Identification of critical systems that require high availability or are considered high-risk

• Explanation of what vulnerabilities are and why it is a good idea to scan for them

• Explanation of an effective vulnerability management program

• Explanation of what patches are and why it is a good idea to implement a patch management strategy

• Explanation of the differences between test and production networks when testing patches

Reading Assignment

Sturges, J. (2017) Great Presentations. Alexandria, VA: Association for Talent Development.

Library Database: Skillsoft

Assignment Objectives

• Apply the relevant cybersecurity theoretical and practical knowledge behind communication and persuasive speaking.

• Practice critical thinking to construct and evaluate cybersecurity claims and arguments with positive outcomes.

Solution Preview :

Prepared by a verified Expert
Business Law and Ethics: Identify a vulnerability and a patch management strategy
Reference No:- TGS03032831

Now Priced at $30 (50% Discount)

Recommended (99%)

Rated (4.3/5)