preview

Vulnerability Assessment For UMU University

Decent Essays

I. Analysis and Planning A. Vulnerability Assessment

Requirements

In the interest of the faculty, students, guests and data within; the University of Maryland University College (UMUC) has expressed a need to secure all assets within the institution.
Herein we will identify the needs of UMUC where it applies to the existence of vulnerabilities within the environment. Detailed below are the proposed methods for the university to fulfill the requirements of performing a vulnerability assessment and then then justification of the need.

Proposed Solution

After having reviewed the latest in vulnerability assessment and management software, Teneable Nessus - Security Center Continuous View is the proposed solution for UMUC at this …show more content…

This is an iterative process until all vulnerabilities have been remediated, mitigated or accepted as risk.

The results of the scan will show levels of criticality based on the type of vulnerability it has acquired. The criticality of found vulnerabilities on each server [4, Fig. A-1] are easily identified by color scale; red being most critical and blue the least [4, Fig. A-2].

Figure A- 1 Figure A- 2

Justification

Teneable Nessus has been rated by its users to be the best in preventative defense in addition to being low cost solution with free online training. Though the application suite requires profile configurations to start, it provides the necessary functions to support the requirements of software and system configuration vulnerability assessments and easily scales to accommodate future growth. Plugins are updated regularly and new plugins are added to account for new Common Vulnerabilities and Exposures (CVEs) as they arise. Security Center Continuous View simplifies the administrator’s role by integrating with other tools like Mobile Device Management (MDM) and a head to toe vulnerability detection and mitigation solution for any platform [3].

B. Security Policy

TestOut LabSim section 4 (Policies, Procedures, and Awareness),

Requirements

An effective security policy consists of many polices which address specific areas within the business. These policies are designed to

Get Access