Provide details on the remediation action that you recommend

Assignment Help Computer Engineering
Reference no: EM133599371

Assignment: Project- Vulnerability Assessment Report

You recently started in a new position at the Celinsky Automotive Group (CAG) as a cybersecurity vulnerability analyst (CVA). The CAG is a chain of 25 dealerships across four Southern states. The 25 dealerships and the CAG headquarters facility are networked with the full range of domain services provided via Active Directory (file shares, shared printers, lightweight directory access protocol, SharePoint, MS365, etc.). Your manager has provided you with a recent scanner output run by the IT department and has asked for your analysis and input on the scanner findings.

Using the scanner output report, Advanced Scan (Single Host), analyzes the findings revealed by the scanner. Although typical scanner output would include multiple tens or even hundreds of hosts, you will focus only on the single host contained within the linked scanner output.

Remember the context of a ransom ware scenario (if needed, review the scenario within Unit I).

Your assessment must include the following information:

Question A. Provide an executive summary in narrative form that provides an overview of the scanner output. Remember the business/mission of the CAG, and ensure your summary is written at the appropriate level.

Question B. Provide a technical assessment targeted at the IT department of the vulnerabilities in the scanner output.

Question C. Provide details on the remediation actions that you recommend for the top three vulnerabilities from the scanner output.

Question D. Discuss the potential impacts that can result from not addressing the vulnerabilities revealed in the scanner output.

Question E. Identify any applicable legal or statutory considerations that organizations must follow to protect information systems and data.

Question F. Research the state breach notification laws for your state using the Security Breach Notification Laws website. Include your state and a brief description of your state's laws regarding breach notifications. Ensure you address of your staterequires breach notification for ransomware infections.

Question G. Provide your recommendation on how CAG should approach vulnerability disclosures and where CAG personnel would report ransomware infections. Justify your reasoning.

Textbook: Grama, J. L. (2022). Legal and privacy issues in information security (3rd ed.). Jones and Bartlett.

Reference no: EM133599371

Questions Cloud

What do you think about revolving door between government : What do you think about the "revolving door" between government (including elected) officials and lobbying for interest groups? Do you think these individuals
Conduct an analysis of the foreign trade policy instruments : Conduct an analysis of the foreign trade policy instruments (international trade agreements) for the US and China and their impact on Apple Inc.
How might you remedy this situation without directly : There is heavy demand for classes at Robert Morris that meet between 10 AM and 3 PM. How might you remedy this situation without directly assigning class times
The requirements for wiretaps under ecpa : The requirements for wiretaps under ECPA are much more stringent than those for stored communications.
Provide details on the remediation action that you recommend : Provide details on the remediation actions that you recommend for the top three vulnerabilities from the scanner output.
What is the total cost of just these two things caused by : What is the total cost of just these two things caused by (or related to) climate change, and how does it compare to the potential cost of converting
Describe the country economic performance over the past : Describe the country's economic performance over the past decade in terms of GDP growth, inflation, and unemployment. Use appropriate charts and data to support
Explain method and provide suggested prevention controls : Explain the method in detail and provide suggested prevention controls. explain the topic and then as suggested controls I would state: The obvious controls.
What is the impact of the tariff removal on producer surplus : What is the impact of the tariff removal on producer surplus? Provide a number and clearly label the area corresponding to the change in producer surplus

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd