Prevention Measures for Vulnerabilities


Question Description

After identifying your organizations' vulnerabilities through previous weekly assignments, you now need to develop security measures to mitigate those vulnerabilities.

Categorize by people, process, or technology.

Write a minimum 2 full page paper (not incuding the title and reference pages) outlining your plan/recommendations for mitigating the vulnerabilities identied.

Include appropriate references to support your analysis.

Submit the paper and Turnitin report using the Assignment Files tab.

The criteria that I use to assign grades for this assignment are as follows:

  • Was the material thoroughly covered?

Deduction Examples - Addressed many of the points (10%)

- Addressed some of the points (20%)

  • Was the minimum number of pages met?

Deduction Examples - Less than 2 full pages (15%)

- One page less than requriements (30%)

  • Did the evaluation follow APA format?

Deduction Examples - minor APA non-compliance (5%)

- major APA non-compliance (10%)

  • Was the evaluation error free?

Deduction Examples - Minor typos/grammatical mistakes (5%)

- Significant typos/grammatical mistakes (10%)

  • Was a reference list included of appropriate resources?

Deduction Examples - Inappropriate references (5%)

- No references included (10%)

  • Was a Turnitin report included?

Deduction Examples - No Turnitin report (10%)

Unformatted Attachment Preview

VULNERABILITY REPORT by David Heininger Submission date: 18-Jun-2018 08:17AM (UT C-0700) Submission ID: 976707010 File name: CMGT _431_WK2_SECURIT Y_VULNERABILIT Y_REPORT .docx (21.02K) Word count: 1228 Character count: 6724 VULNERABILITY REPORT ORIGINALITY REPORT 4 % SIMILARIT Y INDEX 2% 0% 2% INT ERNET SOURCES PUBLICAT IONS ST UDENT PAPERS PRIMARY SOURCES 1 2 2% Int ernet Source Submitted to Colorado State University, Global Campus St udent Paper Exclude quotes On Exclude bibliography On Exclude matches Of f 2% ...
Purchase answer to see full attachment

Tutor Answer

School: New York University

Hi, kindly find attached


Mitigating Vulnerabilities
David Heininger
University of Phoenix
Theodore Glasser
June 30, 2018



Threats and vulnerabilities have increased over the recent past. Organizations like
MultiChoice are not adequately prepared to monitor and minimize these threats. To address this
challenge, MultiChoice, particularly the information technology department needs to effectively
consolidate information regarding vulnerabilities and threats to effectively manage remediation
activities. Accordingly, it is important to adopt a top-down approach while responding to this
It is important for MultiChoice to keep all their systems patched and updated to prevent
common vulnerabilities such as Zero Day Attacks and attacks due to patches available for some
period of time. According to Gupta et al., (2018), performing standard maintenance on the
system reduces the risk by almost 3%. The main focus of updating the system should be focussed
on servers, laptops, desktops, and mobile devices.
To further their efforts in mitigating this risk, the organization sh...

flag Report DMCA

Return customer, been using sp for a good two years now.

Thanks as always for the good work!

Excellent job


Brown University

1271 Tutors

California Institute of Technology

2131 Tutors

Carnegie Mellon University

982 Tutors

Columbia University

1256 Tutors

Dartmouth University

2113 Tutors

Emory University

2279 Tutors

Harvard University

599 Tutors

Massachusetts Institute of Technology

2319 Tutors

New York University

1645 Tutors

Notre Dam University

1911 Tutors

Oklahoma University

2122 Tutors

Pennsylvania State University

932 Tutors

Princeton University

1211 Tutors

Stanford University

983 Tutors

University of California

1282 Tutors

Oxford University

123 Tutors

Yale University

2325 Tutors