Prevention Measures for Vulnerabilities

Anonymous
timer Asked: Jun 30th, 2018
account_balance_wallet $30

Question description

After identifying your organizations' vulnerabilities through previous weekly assignments, you now need to develop security measures to mitigate those vulnerabilities.

Categorize by people, process, or technology.

Write a minimum 2 full page paper (not incuding the title and reference pages) outlining your plan/recommendations for mitigating the vulnerabilities identied.

Include appropriate references to support your analysis.

Submit the paper and Turnitin report using the Assignment Files tab.


The criteria that I use to assign grades for this assignment are as follows:

  • Was the material thoroughly covered?

Deduction Examples - Addressed many of the points (10%)

- Addressed some of the points (20%)

  • Was the minimum number of pages met?

Deduction Examples - Less than 2 full pages (15%)

- One page less than requriements (30%)

  • Did the evaluation follow APA format?

Deduction Examples - minor APA non-compliance (5%)

- major APA non-compliance (10%)

  • Was the evaluation error free?

Deduction Examples - Minor typos/grammatical mistakes (5%)

- Significant typos/grammatical mistakes (10%)

  • Was a reference list included of appropriate resources?

Deduction Examples - Inappropriate references (5%)

- No references included (10%)

  • Was a Turnitin report included?

Deduction Examples - No Turnitin report (10%)

VULNERABILITY REPORT by David Heininger Submission date: 18-Jun-2018 08:17AM (UT C-0700) Submission ID: 976707010 File name: CMGT _431_WK2_SECURIT Y_VULNERABILIT Y_REPORT .docx (21.02K) Word count: 1228 Character count: 6724 VULNERABILITY REPORT ORIGINALITY REPORT 4 % SIMILARIT Y INDEX 2% 0% 2% INT ERNET SOURCES PUBLICAT IONS ST UDENT PAPERS PRIMARY SOURCES 1 2 2% www.sans.org Int ernet Source Submitted to Colorado State University, Global Campus St udent Paper Exclude quotes On Exclude bibliography On Exclude matches Of f 2%

Tutor Answer

Nicholas I
School: New York University

Hi, kindly find attached

Running Head: MITIGATING VULNERABILITIES

Mitigating Vulnerabilities
David Heininger
University of Phoenix
Theodore Glasser
June 30, 2018

MITIGATING VULNERABILITIES

2

Threats and vulnerabilities have increased over the recent past. Organizations like
MultiChoice are not adequately prepared to monitor and minimize these threats. To address this
challenge, MultiChoice, particularly the information technology department needs to effectively
consolidate information regarding vulnerabilities and threats to effectively manage remediation
activities. Accordingly, it is important to adopt a top-down approach while responding to this
risks.
It is important for MultiChoice to keep all their systems patched and updated to prevent
common vulnerabilities such as Zero Day Attacks and attacks due to patches available for some
period of time. According to Gupta et al., (2018), performing standard maintenance on the
system reduces the risk by almost 3%. The main focus of updating the system should be focussed
on servers, laptops, desktops, and mobile devices.
To further their efforts in mitigating this risk, the organization sh...

flag Report DMCA
Review

Anonymous
Awesome! Exactly what I wanted.

Similar Questions
Hot Questions
Related Tags

Brown University





1271 Tutors

California Institute of Technology




2131 Tutors

Carnegie Mellon University




982 Tutors

Columbia University





1256 Tutors

Dartmouth University





2113 Tutors

Emory University





2279 Tutors

Harvard University





599 Tutors

Massachusetts Institute of Technology



2319 Tutors

New York University





1645 Tutors

Notre Dam University





1911 Tutors

Oklahoma University





2122 Tutors

Pennsylvania State University





932 Tutors

Princeton University





1211 Tutors

Stanford University





983 Tutors

University of California





1282 Tutors

Oxford University





123 Tutors

Yale University





2325 Tutors