Answer To: Instructions Your boss wants you to draft a two- to three-page vulnerability process and assessment...
Deepti answered on Mar 09 2021
Vulnerability Management Process Memo
MEMO
[date]
[Your name and course number/section]
[Opening Salutation]:
Overview
This memorandum aims at recommending vulnerability management process best suitable for Mercury, USA. It is divided into three parts. First, the process itself is summarized with its main elements. Second, the vulnerability scanning tool is recommended specifically for Mercury and transport sector. The third part discusses a problem which may occur in the company if the recommendation is not implemented and how the recommended tool serves as the best solution for to overcome the problem.
Part 1: Vulnerability Management (VM) Process Recommendation
Mercury USA offers extensive rail, truck, ocean and barge freight operations including freight contracts, etc. VM process recommended for the company shall include the main stages of scanning, prioritizing and remediating.
The main elements of VM process for Mercury shall include asset management, patch management, vulnerability scanning, penetration testing, vulnerability assessment, metrics, tracking and reporting. The scope of recommended VM process shall include security of all physical and virtual assets of all the business operations of Mercury. The assets shall be identified using vulnerability scanner. It will identify different systems running on Mercury’s network such as servers, databases, desktops, switches, firewalls, peripheral devices, etc. These assets will be probed for their operating systems, software, ports, user accounts, file system, etc. This information shall be used to relate known vulnerability to the scanned systems. For running this association, the scanner shall use vulnerability database in which vulnerabilities enlisted in it which are publicly known. Some of the tools are OpenVAS (Rahalkar, 2019), W3AF (Qianqian, 2014), Nikto2 (Agashe, 2008), Nmap (Orebaugh, 2008)....