Assignment:
Final Vulnerability Assessment Report
Maria Sosa is depending on you, the chief information security officer at your organization, to provide her and other executive-level stockholders with a final vulnerability assessment report. This thorough report should be presented with your findings and recommendations.
Final Vulnerability Assessment Report (seven to 10 page report using this template: Assignment 7, Steps 11 and 12) This report should include the following components:
• Title Page
o Include:
For whom you are preparing the document, the title, the date prepared, and your name as the preparer of the document
• Table of Contents
o with all sections
• Overview (introduction and purpose)
o Include mission-critical aspects of current organizational processes:
- personnel
- physical security
- network security
- cybersecurity
• Scope of Work (one-page report: Assignment 1, Steps 1 and 2)
o Include identified security threats, risks, and vulnerabilities within the organization from the preliminary classification of mission-critical aspects
• Work Breakdown Structure (spreadsheet: Assignment 2, Step 3)
o Include key elements that need to be tested and analyzed:
- internal threats
- external threats
- existing security measures
- compliance requirements
• Threats and Vulnerabilities Report (two to three page report: Assignment 3, Steps 4-6)
o Include:
- explanation of threats and vulnerabilities
- classifications of threats and vulnerabilities
- prioritizations of threats and vulnerabilities
• Lessons Learned Report (two to three page report: Assignment 6, Steps 9 and 10)
o Include:
- reviewed and recorded findings
- consider the report's approach including:
- factors
- assessment completion
- next steps
- other issues to address
• Network Analysis Tools Report (one to two page report: Assignment 4, Step 7--include as Appendix A)
o Include comprehensive recommendations of all components within each key element that should be tested and analyzed:
- internal threats
- external threats
- existing security measures
- compliance requirements
• Vulnerability Assessment Matrix (one-page matrix using template: Assignment 5, Step 8--include as Appendix B)
o Assess vulnerabilities of your organization
Attachment:- Work Breakdown Structure.rar