CMGT 433 Wk 2 Discussion – Vulnerability Management Life Cycle

0 items
CMGT 433 Wk 2 Discussion - Vulnerability Management Life Cycle
CMGT 433 Wk 2 Discussion – Vulnerability Management Life Cycle
$3.00
  • Description

CMGT 433 Wk 2 Discussion – Vulnerability Management Life Cycle

Post a total of 3 substantive responses over 2 separate days for full participation. This includes your initial post and 2 replies to classmates or your faculty member.

Due Day 3

Respond to the following in a minimum of 175 words:

Vulnerability scans as part of vulnerability management efforts are important events to conduct for any network infrastructure. Scans will often produce results that need to be analyzed for validity, followed by the development of a remediation plan to prioritize detected vulnerabilities, and determine actions to correct them. These ongoing efforts comprise the phases of the vulnerability management life cycle—testing, detection, and remediation.

  • Which factors are considered when prioritizing vulnerabilities for remediation? What data or metrics are used to evaluate these factors?
  • Describe a common type of cybersecurity vulnerability. Which tools are available to scan for this type of vulnerability? How do they work?
  • Explain techniques that might be used to validate a scan report. Differentiate and describe the 4 different types of scan reports.

Due Day 7

Post 2 replies to classmates or your faculty member. Be constructive and professional.