Vulnerability assessment planning

Assignment Help Basic Computer Science
Reference no: EM131192232

Vulnerability Assessment Planning

For this assignment, you will need to develop a vulnerability assessment plan. The concepts needed to complete this assignment are found in your reading assignment and in the unit lesson, but you can draw on all of the lessons thus far in this course.

Choose one of the following businesses:

e-commerce retailer,

a retailer with his/her own credit card,

a money transfer/loan company, or

a personal prescription/medical supply home delivery service.

Be sure that you address the following in your plan:

1. Provide a list of at least five different hosts pertinent to the business that you chose.

2. For each host chosen, describe how it will be assessed and what threats to the host are being assessed. (Also, describe the circumstances surrounding the threats, such As when and how often).

3. Explain your reasoning for choosing a specific assessment for each host.

4. Describe the format that your vulnerability assessment plan would be delivered in, and describe who will receive and review the results.

Reference no: EM131192232

Find how many register windows are available for use

Assume a RISC machine utilizes overlapping register windows for passing parameters between procedures. Machine has 298 registers. How many register windows would be available

Discuss the systems development life cycle

Discuss the systems development life cycle as applied to project management: Initiation, Planning, Acquisition or design and development, Implementation, Operations/Maintena

Selecting and installing a nic

In a few sentences, describe some of the considerations you'll have to make when selecting and installing a NIC. What questions will you ask when accomplishing this task?

Discuss the potential impact that could occur

Discuss the potential impact that could occur if one of the core technologies in an IT system goes down. For example, if a wireless network fails, what could be the impact o

Design a message-passing routing algorithm for mesh network

Write a program in occam for each node in a three-dimensional hypercube to route a message from a source node to a destination node using the hypercube routing algorithm des

Perform the transformation to the next lower level

Suppose you were given a task at one of the transformation levels shown in Figure 1.6, and required to tranform it to the level just below. At which level would it be most d

The media access control (mac) address of a network

The media Access Control (MAC) address of a network interface ia a unique address. Each network interface relating to it's MAC fits the critera of a function because each devi

Create two constructors

Create two constructors (default and initialization), accessor (get/set) methods, a printInfo method, a toString method, a method deposit that will increase the balance by a

Reviews

Write a Review

 
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd