Your boss wants you to draft a two- to three-page vulnerability process and assessment memorandum addressing the main points of a VM process for Mercury

Your boss wants you to draft a two- to three-page vulnerability process and assessment memorandum addressing the main points of a VM process for Mercury USA. You will cover the main elements of a vulnerability management process, tailored to Mercury USA’s business in the transportation sector, evaluate the OpenVAS scanning tool, and provide recommendations for mitigating the vulnerabilities found within the OpenVAS report.

The third-party pen tester used the free tool Open Vulnerability Assessment Scanner (OpenVAS) to scan Mercury USA’s network. Review the report from the OpenVAS Scan

As you review the scan consider 

Priority

  • Difficulty of implementation
  • Communication/change control
  • Inhibitors to remediation
    • MOUs
    • SLAs
    • Business process interruption
    • Degrading functionality

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

In preparation for a meeting with upper-level management, you decide to conduct research on the role of statistical forecasting in decision analysis. Write

In preparation for a meeting with upper-level management, you decide to conduct research on the role of statistical forecasting in decision analysis. Write a paper of 5-7 pages (excluding the title and reference pages) discussing the importance of accreditation and credentialing, strategies for quality improvement, and the role of statistics and

Description Deliverable Length: 3 pages Develop a facts and assumptions information paper about a core issue dealing with 1 of the following:

Description Deliverable Length: 3 pages Develop a facts and assumptions information paper about a core issue dealing with 1 of the following: TechnologyVulnerability assessment and protectionIntellige Description Deliverable Length: 3 pages Develop a facts and assumptions information paper about a core issue dealing with 1 of the following: Technology Vulnerability assessment