Project 2 – Vulnerability Assessment Report

Project 2: Vulnerability Assessment Report

Having Trouble Meeting Your Deadline?

Get your assignment on Project 2 – Vulnerability Assessment Report completed on time. avoid delay and – ORDER NOW

You recently started in a new position at the Celinsky Automotive Group (CAG) as a cybersecurity vulnerability analyst (CVA). The CAG is a chain of 25 dealerships across four Southern states. The 25 dealerships and the CAG headquarters facility are networked with the full range of domain services provided via ActiveDirectory (file shares, shared printers, lightweight directory access protocol, SharePoint, MS365, etc.). Your manager has provided you with a recent scanner output run by the IT department and has asked for your analysis and input on the scanner findings.

Using the scanner output report, Advanced Scan (Single Host), analyze the findings revealed by the scanner. Although typical scanner output would include multiple tens or even hundreds of hosts, you will focus only on the single host contained within the linked scanner output.

 

Remember the context of a ransomware scenario (if needed, review the scenario within Unit I).

Your assessment must include the following information:

· Provide an executive summary in narrative form that provides an overview of the scanner output. Remember the business/mission of the CAG, and ensure your summary is written at the appropriate level.

· Provide a technical assessment targeted at the IT department of the vulnerabilities in the scanner output.

· Provide details on the remediation actions that you recommend for the top three vulnerabilities from the scanner output.

· Discuss the potential impacts that can result from not addressing the vulnerabilities revealed in the scanner output.

· Identify any applicable legal or statutory considerations that organizations must follow to protect information systems and data.

· Research the state breach notification laws for your state using the Security Breach Notification Laws website. Include your state and a brief description of your state’s laws regarding breach notifications. Ensure you address of your state requires breach notification for ransomware infections.

· Provide your recommendation on how CAG should approach vulnerability disclosures and where CAG personnel would report ransomware infections. Justify your reasoning.

 

Your paper must be at least four full pages in length. Adhere to APA Style when creating citations and references for this assignment.

Textbook Reference

Grama, J. L. (2022). Legal and privacy issues in information security (3rd ed.). Jones and Bartlett.

https://online.vitalsource.com/#/books/9781284231465

Explanation & Answer

Our website has a team of professional writers who can help you write any of your homework. They will write your papers from scratch. We also have a team of editors just to make sure all papers are of HIGH QUALITY & PLAGIARISM FREE. To make an Order you only need to click Order Now and we will direct you to our Order Page at Litessays. Then fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.

Fill in all the assignment paper details that are required in the order form with the standard information being the page count, deadline, academic level and type of paper. It is advisable to have this information at hand so that you can quickly fill in the necessary information needed in the form for the essay writer to be immediately assigned to your writing project. Make payment for the custom essay order to enable us to assign a suitable writer to your order. Payments are made through Paypal on a secured billing page. Finally, sit back and relax.

Do you need an answer to this or any other questions?

Similar Posts