Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

perform a vulnerability assessment, which identifies, classifies, and ranks the vulnerabilities for your organization from a disaster-management perspective. Step 1: Classify Aspects to Be Addressed

perform a vulnerability assessment, which identifies, classifies, and ranks the vulnerabilities for your organization from a disaster-management perspective. Step 1: Classify Aspects to Be Addressed

Before beginning the vulnerability assessment, you must first create a preliminary classification of mission-critical aspects to be addressed in the assessment. Determine what "secure" means to the organization by reviewing the topic of cybersecurity vulnerability, evaluating existing business practices, and interviewing senior personnel.

Prepare an overview of the mission-critical aspects of the organization's current processes. Include personnel, physical security, network security, and cybersecurity in the overview. You will use this overview to prepare a scope of work in the following step.

Step 2: Create a Scope of Work (SoW)

In this step, you will perform a vulnerability assessment once again as the CISO. Since the previous contractor was an external consultant, you will be able to offer insights and consider the big picture of the organization when conducting the assessment. You will prepare for the assessment by creating a comprehensive list of security needs based on findings from the previous step. This list should identify threats, risks, and vulnerabilities to achieve a holistic view of the risk across the entity.

The scope of work is the key element to any project and important to learn. It should be filed as supplementary documentation for purposes of evaluating execution and directional purposes of meeting milestones of a multiphase comprehensive project plan within the vulnerability assessment. The scope of work will be the first section of the final vulnerability assessment report.

Combine the overview from the previous step with the list of security needs into a one-page SoW report. Submit the report for feedback.

Step 3: Develop a Comprehensive Work Breakdown Structure (WBS)

Within the previous step, the SoW report conveyed a brief overview of the organization's critical aspects and a list of the organization's security needs. Now, you are ready to develop a comprehensive work breakdown structure (WBS).

This breakdown provides more detail, so you will need to devise examples of procedures you might recommend to your organization. Some examples include a penetration test, baseline analysis, or system logging. Note the tools and techniques to use in conducting a vulnerability assessment to be used later in the project.

Using a spreadsheet, create the comprehensive work breakdown structure, including key elements that must be tested and analyzed. Organize the spreadsheet using the elements identified in the SoW from the previous steps and the following:

  • internal threats: personnel, policies, procedures
  • external threats: systems, connectivity, databases
  • existing security measures: software, hardware, telecommunications, cloud resources
  • compliance requirements: legal aspects (federal, state, and local), contractual demands up and down the supply chain

Note the security threats and vulnerabilities. This plan will serve as the second section of the final vulnerability assessment report.

Submit the comprehensive work breakdown structure for feedback

Step 4: Explain Security Threats and Vulnerabilities

In the previous step, you developed a comprehensive work breakdown structure. In this step, you will explain the security threats and vulnerabilities included in the plan. In the explanations, consider relevant concepts such as the threat modeling process and third-party outsourcing issues. Include system and application security threats and vulnerabilities.

Reference aspects that are not being included. Note that you would need to obtain management agreement with the initial analysis of mission-critical components to be included in the assessment. This phase includes management input into the prioritization process of all risks from internal and external sources.

This information will be used in the following steps to develop the threats and vulnerabilities report, which will then be included in the Final Vulnerability Assessment Report.

Next, you will classify the risk of threats and vulnerabilities.

Classify the Risk of Threats and Vulnerabilities

Throughout this project, you have developed a foundation for the vulnerability and threat assessment by classifying critical organizational aspects, creating a scope of work, and explaining security threats and vulnerabilities. Now, you are ready to classify the organization's risk according to the relevant data determined in the project plan.

Company demands, management input, compliance requirements, and industry probability of exploitation are all considerations when classifying the risk of threats and vulnerabilities. Based on these considerations for the midsize government contracting group, further clarify the vulnerabilities and threats you have itemized. Explain why each is a vulnerability or threat, as well as why it is relevant to the overall assessment.

Consider continuous monitoring issues as you work through the classification. Use the threat and vulnerability explanations from the previous step and risk classifications from this step to develop the threats and vulnerabilities report.

In the next step, you will prioritize the threats and vulnerabilities you have explained and classified.

Please I need a step-by-step interpretation of my assignment. My chosen industry is vulnerability assessment of healthcare information systems

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Introduction to Algorithms

Authors: Thomas H. Cormen, Charles E. Leiserson, Ronald L. Rivest

3rd edition

978-0262033848

More Books

Students also viewed these Algorithms questions

Question

Write pseudocode for Strassens algorithm.

Answered: 1 week ago

Question

Evaluate the product Tk=2(1 1/k).

Answered: 1 week ago