CIT 270: Hands-On Projects
Choose one hands-on project at the end of the module (or chapter). Complete it. Fill out the following
template. Then upload this document to I-Learn Canvas for your Hands-On Project submission.
Project Module and
Number (1pts)
Module 2 Project 2: Explore National Vulnerability Database
Key words and
Definitions
(3pts)
1.
Vulnerability – A weakness in a system design that could be exploited
to gain unauthorized access to a system
2.
Threat actors – Individuals who intend to cause harm to systems by
exploiting them
3.
Vector – A path in which an attacker can gain unauthorized access to a
system or network, usually to cause harm
Key takeaways, or:
What did you learn?
(4pts)
Honestly, before this project, I hadn’t even heard of the National Vulnerability
Database. Now that I’ve learned what it is, I’m very glad that it exists. I’m glad
there is a resource that contains vulnerability management data. The amount
of vulnerabilities that are received and analyzed is pretty incredible. There is a
lot of work and data that goes into making a repository like this possible, and
this project has shown that to me.