Assignment:
Homeland Security
Include the data and exploitation information found in the ethical hacking Workspace exercise (programs used in workspace were Nessus, Nmap, Wireshark and Cain&Abel) and any historical information related to this exploit. Use the US-CERT website and other resources that provide common vulnerability reporting.
Explore the resources for risk mitigation and provide the risk, response, and risk mitigation steps that should be taken if an entity suffers the same type of attack (JP Morgan Data Breech).
Provide a risk-threat matrix and provide a current state snapshot of the risk profile of the financial services sector.
Review and refer to this risk assessment resource to aid you in developing the report.