Vulnerability Information Security Assessment
Maria Sosa is depending on you, the chief information security officer at your organization, to provide her and other executive-level stockholders with a final vulnerability assessment report. This thorough report should be presented with your findings and recommendations.
Final Vulnerability Assessment Report (seven- to 10-page report using this template: Assignment 7, Steps 11 and 12) This report should include the following components:
Title Page
- · Include:
- · for whom you are preparing the document, the title, the date prepared, and your name as the preparer of the document
Table of Contents
- · with all sections
Overview (introduction and purpose)
- · Include mission-critical aspects of current organizational processes:
- · personnel
- · physical security
- · network security
- · cybersecurity
Scope of Work (one-page report: Assignment 1, Steps 1 and 2)
- · Include identified security threats, risks, and vulnerabilities within the organization from the preliminary classification of mission-critical aspects
Work Breakdown Structure (spreadsheet: Assignment 2, Step 3)
- · Include key elements that need to be tested and analyzed:
- · internal threats
- · external threats
- · existing security measures
- · compliance requirements
Threats and Vulnerabilities Report (two- to three-page report: Assignment 3, Steps 4-6)
- · Include:
- · explanation of threats and vulnerabilities
- · classifications of threats and vulnerabilities
- · prioritizations of threats and vulnerabilities
Lessons Learned Report (two- to three-page report: Assignment 6, Steps 9 and 10)
- · Include:
- · reviewed and recorded findings
- · consider the report’s approach including:
- · factors
- · assessment completion
- · next steps
- · other issues to address
Network Analysis Tools Report (one- to two-page report: Assignment 4, Step 7–include as Appendix A)
- · Include comprehensive recommendations of all components within each key element that should be tested and analyzed:
- · internal threats
- · external threats
- · existing security measures
- · compliance requirements
Vulnerability Assessment Matrix (one-page matrix using template: Assignment 5, Step 8–include as Appendix B)
- Assess vulnerabilities of your organization