Instructions This week, you will submit the second project, VM Scanner Background Report, based on the Nessus Report. As you are writing your report, you may want to refer back to the CEO’s video in...

1 answer below »
instructions included...please follow the rubric.. last assignment wasn't followed and i failed


Instructions This week, you will submit the second project, VM Scanner Background Report, based on the Nessus Report. As you are writing your report, you may want to refer back to the CEO’s video in Week 1 to make sure your analysis and recommendations align with the CEO’s priorities and concerns. You should link your analysis to the kinds of organizational functions and data associated with a transportation company (e.g., protecting order data, customer lists, sales leads, Payment Card Industry (PCI) compliance for processing credit, proprietary software, etc.) and provide your recommendation if Mercury USA should purchase the Nessus tool. This report should be four to six pages in length and include a title/cover page. Include in-text citations and a reference page with three quality sources in a citation style of your choice. How Will My Work Be Evaluated? For this assignment, you are asked to provide your supervisor, Judy, with a technical evaluation of a vulnerability scanner. By documenting your results in an effective background report, you are showing how you use your technical knowledge to convey your ideas to others in a professional setting. Your ability to express your findings using the right mix of technical detail in a business context is an important workplace skill. The following evaluation criteria aligned to the competencies will be used to grade your assignment: · 1.3.1: Identify potential sources of information that can be used to develop and support ideas. · 1.4.1: Produce grammatically correct material in standard academic English that supports the communication. · 10.1.1: Identify the problem to be solved. · 12.2.1: Identify systems for the risk assessment. · 12.3.1: Select controls. · 13.2.1: Evaluate vendor recommendations in the context of organization requirements. If you haven’t already downloaded it last week, download the VM Scanner Background Report Template now and follow the instructions in the document. Delete the instructional text from the template before you submit. Rubric Name: Project 2: VM Scanner Evaluation Background Report This table lists criteria and criteria group name in the first column. The first row lists level names and includes scores if the rubric uses a numeric scoring method.Evaluation Criteria Exceeds Performance Requirements 100% Meets Performance Requirements 85% Approaches Performance Requirements 75% Does Not Meet Performance Requirements 0% Criterion Score 1.3.1: Identify potential sources of information that can be used to develop and support ideas. 12 points Identifies potential sources of information in a thorough and accurate manner to develop and support ideas 10.2 points Identifies potential sources of information to develop and support ideas. 9 points Attempts to identify potential sources of information to develop and support ideas. 0 points Does not identify potential sources of information to develop and support ideas. / 12 1.4.1: Produce grammatically correct material in standard academic English that supports the communication. 12 points Produces grammatically correct material in flawless standard academic English that fully supports the communication. 10.2 points Produces grammatically correct material in standard academic English that supports the communication. 9 points Attempts to produce grammatically correct material in standard academic English, but mistakes in some areas affect the credibility of the communication. 0 points Does not produce grammatically correct material, and the mistakes hamper the communication. / 12 10.1.1: Identify the problem to be solved. 19 points Presents a relevant IT problem clearly and specifically. 16.15 points Presents an IT problem that requires a solution. 14.25 points Identifies an IT problem but may lack clarity and/or specificity regarding the need to be addressed. 0 points Does not identify an IT problem to be solved. / 19 12.2.1: Identify systems for the risk assessment. 19 points Clearly identifies the most critical vulnerabilities with the system and accurately describes the security issues that need to be addressed. 16.15 points Identifies most of the vulnerabilities with the system and describes most of the security issues that need to be addressed. 14.25 points Identifies some of the vulnerabilities with the system and describes some of the security issues that need to be addressed. 0 points Does not address the vulnerabilities with the system and does not describe the security issues that need to be addressed. / 19 12.3.1: Select controls. 19 points Selects highly effective controls. 16.15 points Selects appropriate controls. 14.25 points Selects some appropriate controls. 0 points Does not select appropriate controls. / 19 13.2.1: Evaluate vendor recommendations in the context of organization requirements. 19 points Evaluate and provides detailed justification for vendor recommendations in the context of organization requirements. 16.15 points Explains how ethical principles used in the information technology industry apply to the welfare and safety of stakeholders and society. 14.25 points Attempts to explain how ethical principles used in the information technology industry apply to the welfare and safety of stakeholders and society but does not articulate the issues clearly or thoroughly. 0 points Does not explain how ethical principles used in the information technology industry apply to the welfare and safety of stakeholders and society. / 19 Rubric Total ScoreTotal / 100 Overall Score Overall Score Level 490 points minimum Level 380 points minimum Level 270 points minimum Level 10 points minimum
Answered Same DaySep 21, 2021

Answer To: Instructions This week, you will submit the second project, VM Scanner Background Report, based on...

Ritu answered on Sep 27 2021
141 Votes
CMIT 421
Threat Management and Vulnerability Assessment
        1
Contents
Introduction    2
Part 1: Nessus Vulnerability Report Analysis    2
Part 2: Business Case    2
Part 3:Nessus Purchase Recommendations    3
Conclusion    4
References    4
Introduction
Mercury USA is currently faci
ng many security systems issues. The company has experienced vulnerabilities due to false detection, debugging, as well as system-detected information overrides. Therefore, the company must implement specific vulnerability management systems to improve operational efficiency. The company can use a vulnerability tool called Nessus.
This report provides an assessment to address the vulnerability process as well as key points of the Mercury USA VM process. The report covers key elements of the vulnerability management process customized to Mercury USA's business activities in the transportation sector. The report also evaluates the OpenVAS scanning tool as well as provides recommendations that Mercury USA can implement to mitigate the vulnerabilities identified in the OpenVAS report. Reports provide analysis of data from multiple sensors as well as sources.
Part 1: Nessus Vulnerability Report Analysis
Vulnerability management includes identifying, assessing, managing, as well as reporting threats on an organization's security system. Scan all software running through network systems in your organization. This identifies a security vulnerability that could compromise your company. This prevents attackers from infringing your organization's information.
Based on the review of the report from the OpenVAS scan, the recommended VM process for Mercury USA implements TCP timestamps on remote hosts. This recommendation fits Mercury USA's business in reducing as well as fixing all identified problems in the transport system. The overall scenario related to the Transportation as well as Cyber Security vulnerabilities indicates that the primary factor of the VM process coordinated with Mercury USA as well as Transportation is vendor remediation as well as mitigation.
The scope of the VM process is defined by the vulnerability detection method used as well as is planned using the vulnerability as well as product detection output. The assets involved in the VM process are identified by carefully reviewing the logs from the application. Reviews such as the Windows event log as well as Syslog in the generalized logging collector can help evaluate as well as scan for vulnerabilities. The industry standard scanning tools are redscan as well as tenable scanning. The recommended frequency of Mercury USA scans is twice a month due to a high level of vulnerability detected by the transport system (McMillan, 2017). The results of VM process scans as well as recommended measures can be reported by classifying hosts into High, Medium, Low, or Log as...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here