Network Vulnerability

Description

The security program has been a huge success. Several of the PCS government clients have expressed their appreciation and increased confidence in the company’s ability to protect their program data and assets. Your company is now in the continuous monitoring phase and your information security analysts are performing routine assessments on the servers and workstations.

Don't use plagiarized sources. Get Your Custom Assignment on
Network Vulnerability
From as Little as $13/Page

Based on your research for Unit 8:

• Describe the importance of assessments in system and application security.

• Describe some of the major challenges with this area of security and address why the job is never done.

• Review the results of the vulnerability scan provided by one of your analysts for a client’ssystem. Explain ten of the failures found on the client system and how the PCS security program prevents these problems on the corporate network.

• Conclude by discussing the relationship between assessments and the importance it has in continuous monitoring.

The requirements for your assignment are:

• 1-2-page APA paper excluding title and reference pages

• Provide at least two references and in-text citations in APA format

• College level writing

Link-to assessment report .

https://learn-us-east-1-prod-fleet02-xythos.content.blackboardcdn.com/5d48331b24326/33885166?X-Blackboard-S3-Bucket=learn-us-east-1-prod-fleet01-xythos&X-Blackboard-Expiration=1709348400000&X-Blackboard-Signature=3INvvjoQrybvQn5yGjGIamlgY9%2BWlpERGQsPd7L%2FBXc%3D&X-Blackboard-Client-Id=300560&X-Blackboard-S3-Region=us-east-1&response-cache-control=private%2C%20max-age%3D21600&response-content-disposition=inline%3B%20filename%2A%3DUTF-8%27%27Network%2520Vulnerability%2520Assessment%2520Report.pdf&response-content-type=application%2Fpdf&X-Amz-Security-Token=IQoJb3JpZ2luX2VjED4aCXVzLWVhc3QtMSJIMEYCIQDSowN1RBdedXTNO5470oJHhouhGiZF0V6HD3tx%2Bwh6%2BAIhAJMowUcFBK1dDF1eLyYGAE9TCiSDXHmgbDa56A9q7WpkKrQFCDcQAxoMNjM1NTY3OTI0MTgzIgxrx%2B1cpcoEvVc%2F6CsqkQXzvSEYMpe7W5tE4JjaZJP9jry1zjs6r0%2FPFfteDC2Sra4%2Bfydr4wDH7z6Xxf85wf0luHC5C%2B21pzFPUh6jzX5GXb3zq99LPsnqtyaA8BZc8MCY5CU8wua%2FnSUN9PqJh7l%2BNsRZrilMvN3iDntNZVhjdXl0RvN1IDufxWYbcL%2BRY2oY8Ccnt%2F9xXaW26T6CcoIMMCjWmLN5zaE4lYDDoUBkMoboaH7qVz50RP5eXq9OYEEX0W2fr9zKTp6L7SYQH0dMlB8wH3A%2B2KadWGfZg6%2FEVZiPZ2Ojdj6fCZFwtAoACZcKm51E9Hr3N7ES2pm3Zl6uzFtCQgGYFyBxQ1kNv43Hvp4cQ5yqJnX0EY4t%2FiC8K20DFN1KBPEtGaZdWSTgly%2Fc63v0pZHzyp3N%2FS8uPrHjrn5Iu8DoESnUNDD7%2FaRmNzc5BurWpTFd99HKyDQLGMxgD0l%2BIV8xKZ1vRZTqc%2F4%2FIZXCqIl4CQ2YYOAvleeh%2FPp%2Fg2vzgAnKqfd3VAtpv%2FyhXBgmcsE9wiqpZFGMvBGlbAHa4AlQkG6L7RbIACiuoMYRFLFajxgGaIBm6GXOnMfmiImnOjDPqyPvr4H46iDRq8LwC5Z8cHMv%2FTpPwhjf86YIWP%2FkfSzDsbRKkuNu8xDz88FJCdrn9DGYqt65A3gAHqNlkahGvYigYYdyrC0lDMctJLAoO%2Bgk0%2BtiQhepMpZNrOahrFw%2FalstTYOjZ7pJAZmxqh%2FuUREiZno5CIsxLUgPJobV3jCvH8d%2Bf2xDKSP82JqfAenNfWGjyvLRT9jhUHuSBrVdmB7PW7FmEZ1QJg3e63xM3yTPp4qd6rJSBio42lsT1YYAtYqcTMgT0uPYqiEyaaRqryvrKXf9ShYb2OEw45OJrwY6sAGp6rnM%2Ffj8ie6gHmwLd7bVZcz7QWhmzgaCIz64xbmayjzqyFOLulUrEkTYdyLZK7pe6Ry4ILgjDvXVFt1A6hAIkr%2FFOSQAEaZZfxz9vItzbOZuAa7b%2B2CrZdNtCkSjkwz15Z0fVnxH%2BaEISV%2FhAeFSUe136e75Tsf863y6kYrewhtCSCDe61gf6N1tJEwI1RreN3w3rMx3qrBFkYMoTKlzfQ7cZHiNtjGEhFA%2BetFp8g%3D%3D&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Date=20240301T210000Z&X-Amz-SignedHeaders=host&X-Amz-Expires=21600&X-Amz-Credential=ASIAZH6WM4PL3QSK6INA%2F20240301%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Signature=2687f4f0bfa2a9a1040859701c798f9ba6ab9d86a60b97daa951220a93594032