preview

Psy 270 Week 4 Chapter 7 Paper

Decent Essays

Week 4 Chapter 7 Assignment
David McNamee

As it applies to an IT environment, a vulnerability assessment is used to identify existing vulnerabilities giving the environment owner an awareness of what needs to be fixed (Who needs a Vulnerability Assessment, 2017). The assessment needs to be viewed for what it is, a onetime occurrence that in no way highlights all vulnerabilities. Multiple assessments of vulnerability must be conducted over time to ensure that as many possible avenues of weakness are explored, identified, and marked for improvement. As new systems are added, programs changed, or other changes to the system are made vulnerabilities might be created. Penetration testing is the attempt to identify security weaknesses within the IT infrastructure of an …show more content…

If the management team wants a list of issues which can be regulated with additional security measures then I would recommend a vulnerability assessment. If the management team wants to determine the effectiveness of the current security measures and the ability of IT department employees to deal with an active threat, I would recommend a penetration test. The probable best solution is to conduct both testing methods, with the vulnerability test conducted first, with the penetration test being conducted to determine the effectiveness of the vulnerability test after actions. Conducting vulnerability assessments on a regular basis can assist the organization in reducing the likelihood of attack. Conducting penetration testing at random times during a fiscal year will also reduce the probability of attack through improved security. Not only will this kind of testing regimen ensure that weaknesses and vulnerabilities are quickly identified but it will also improve the security awareness of individual

Get Access