545a8 | Information Systems homework help

Answer these lab questions

Lab Assessment Questions

 1. Based on your research, what are the first steps that an organization should follow after it has identified a known vulnerability? 

2. When categorizing vulnerabilities for a Code Review Report that enumerates them, what model should an auditor use? 

3. What is the standard formula used to rank potential threats? 

4. What is the importance of having a security-incident response plan in an organization? 

5. How could the findings from the skipfish and RATS scans be categorized and presented in a vulnerability assessment report? 

6. What pertinent information should an auditor include in an assessment report? 

7. Which vulnerabilities from the skipfish report did you include in your Lab Report file? Why?

0 replies

Leave a Reply

Want to join the discussion?
Feel free to contribute!

Leave a Reply