What is an end system technical security assessment


Questions:

1) Please identify and describe the research direction (if any) you want to conduct in authentication and handshake protocols.

2) Please describe any research experience and/or preparation that may support you towards this research-oriented PhD study.

My capstone project for the Bachelor's degree was to identify vulnerabilities in virtual utility companies by using security tools and developing mitigation plans based on the results.

Hers is some helpful info about my research.

VUC recently has procured actual devices from the field made available for your assessment. You will need to review the devices and perform a security assessment of them and report back to VUC management.

What is an end system technical security assessment?

Use tools such as Nessus, Harris STAT, LanGuard, MBSA, CISecurity.org, vendor documentation, message boards, exploitdb, Metasploit, or any other technical scanning/assessment tool to produce a report Then, using these results - report upon each individual finding:

How to respond (How to remediate with prioritization)?

When to respond (What is the exposure)?

What if you do nothing (What is the worst that could happen)

For this part: (As an Individual)

Perform a security assessment of a host operating system configuration [use your computer, an online system image or a computer in the lab]

For this part: (As a Group)

Perform a security assessment of three of the VUC field devices available in the computer lab on the 3rd floor.

Solution Preview :

Prepared by a verified Expert
Computer Network Security: What is an end system technical security assessment
Reference No:- TGS01935261

Now Priced at $20 (50% Discount)

Recommended (99%)

Rated (4.3/5)