Project Scenario for Project 1: Previously, the CEO told you about the breach at a rival company and his concerns for security

Project Scenario for Project 1:

Previously, the CEO told you about the breach at a rival company and his concerns for security at Mercury USA. In light of these developments, Mercury USA has decided to conduct vulnerability assessments. An outside firm has conducted penetration tests on Mercury’s systems and provided the reports. Now, it is up to you as the cyber threat analyst to look at those reports, apply them to the specific company setup and business needs, and recommend changes.

Mercury USA’s concerns:

· protecting customer information 

· protecting proprietary business data

· protecting dangerous loads/hazardous materials during transportation  

Before you came onboard, a third-party penetration tester was brought in to assess Mercury USA’s security posture and network. One of the findings from the pen test report was the realization that an important part of a VM process is a vulnerability scanner. The pen tester provided a scan report using the free tool Open Vulnerability Assessment Scanner (OpenVAS). Judy has provided you with the OpenVAS report for your initial analysis.

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

  Describe the different display types available.  Describe how to adjust display settings and comment on the various video standards, resolutions, and

  Describe the different display types available.  Describe how to adjust display settings and comment on the various video standards, resolutions, and concepts. You need to describe how to build custom configurations.  In particular describe the differences between a standard thick client, virtualization workstation and thin clients. Instructions: Responses should include

CSCI 351 Assignment60 pointsInstruction: · Show your

CSCI 351 Assignment 60 points Instruction: · Show your own work (at least 50% penalty otherwise) · Submit (1) a single word document containing the source code (copied from the source program file) of your program and screenshot of the program run including the number of words tested. · Submit