Identify steps that take place in a vulnerability assessment


Assignment

You are a new IT security professional for a small police department. At first you did not see your agency as being a large target for attacks. However, the city recently appointed a new and very controversial police chief. Following the appointment of the new police chief, you discovered a plain text file in the root of the C: drive on a server that said "hacked by the KDC."

You have reported this to your immediate supervisor, who has assigned you to perform a penetration test on the agency's network and to perform a vulnerability assessment. Although you strongly agree with your supervisor and realize that such measures are necessary, you believe that it would be much more appropriate to outsource this to a security consulting firm.

To fulfill your supervisor's initial request, you are preparing to perform a preliminary network penetration test on your agency's network. However, you prefer to take an automated approach and are wondering if such network penetration tools exist.

Task:

Create a PowerPoint presentation (No longer than 20 slides) explaining why the vulnerability assessment for the police department's network should be outsourced by doing the following:

Note: The slides in your presentation should include only the main points you wish to make, with more extensive information included in the presenter notes section of the presentation.

• Explain the difference between a penetration test and a vulnerability assessment.

• Identify the steps that should take place in a vulnerability assessment.

• Discuss the risks involved in conducting an internal vulnerability assessment.

• Present the steps your agency should take to conduct a vulnerability assessment with a third party, including legal considerations such as applicable laws and ramifications of ill effects or discoveries of the vulnerability assessment.

o Justify the legal considerations you presented.

• Include presenter notes for each slide.

Format your assignment according to the give formatting requirements:

• The answer must be using Times New Roman font (size 12), double spaced, typed, with one-inch margins on all sides.

• The response also includes a cover page containing the student's name, the title of the assignment, the course title, and the date. The cover page is not included in the required page length.

• Also include a reference page. The references and Citations should follow APA format. The reference page is not included in the required page length.

Solution Preview :

Prepared by a verified Expert
Other Subject: Identify steps that take place in a vulnerability assessment
Reference No:- TGS03160913

Now Priced at $30 (50% Discount)

Recommended (91%)

Rated (4.3/5)