Could someone complete an analysis of a vulnerability scan
Could someone complete an analysis of a vulnerability scan
Your task will be to review, analyze, and report on a log file generated by an automated sample vulnerability scan. Parse a sample vulnerability log and complete the following tasks. A sample file will be moved to Doc Sharing that contains information from a real vulnerability scan. (Note: It is large; about 20MB in size)
Step 1
Evaluate it, summarizing:
- The total number of vulnerabilities found by the scan
- The total number of unique vulnerabilities found that were critical in nature (i.e., greater than or equal to a CVSS score of 7.0)
- The total number of machines affected with critical vulnerabilities
Step 2
Select four different specific critical vulnerabilities. Research each of them and write a 1-page summary of each that includes the following details:
- Describe the vulnerability
- When it was discovered
- What the potential impact of the vulnerability is
- Research methods to fix, correct, prevent, or mitigate the vulnerability.
Step 3
Describe your strategy to remedy these logged vulnerabilities if you owned the site described by the logs.
Please limit your paper to 10 pages.
(Note: There are many sources on the Internet that will reveal this information, from blogs and forums, technical resources, as well as sites such as http://cve.mitre.org, http://csrc.nist.gov/groups/SMA/ate/, https://www.first.org/cvssand so on. Documentation on most vulnerabilities can usually be found by simply searching for the vulnerability name on any browser and perusing the search results.)
"You need a similar assignment done from scratch? Our qualified writers will help you with a guaranteed AI-free & plagiarism-free A+ quality paper, Confidentiality, Timely delivery & Livechat/phone Support.
Discount Code: CIPD30
Click ORDER NOW..


