Get Similar Asssignment Answers & Custom Paper Writing Services

To hire a writer, fill the order form with details from your nursing assessment task brief.

Posted: September 8th, 2022

MEMO

[date]
[Your name and course number/section]
[Opening Salutation]:
Overview
A robust vulnerability management process involves the collaboration of security components which are critical in an organization. The concerns of Mercury USA that involves protection of customer information, proprietary business data and dangerous load and other hazardous materials during transportation. The first part gives recommendation for the vulnerability management process for Mercury USA. It will highlight the major VM process components and recommendations that meet the business needs of Mercury USA. The second part describes the vulnerability scanning tools evaluations and the recommendations. Lastly, the outcomes of not implementing the recommendation of a VM process will be discussed.
Part 1: Vulnerability Management (VM) Process Recommendation
The main objective of the Vulnerability management process in Mercury USA will be to detect and remediate the vulnerability through timely solutions. The vulnerability management process in Mercury USA involves preparation, vulnerability scan, definition of remediating actions, the implementation of the actions and the rescan.
In planning of the process, the preparation is recommended to start with a small scope which starts out with a small number of systems, for Mercury and the transportation sector. Security officer should be involved in making an agreement of the systems to be included and those to be excluded from the vulnerability management process. Other assets include the operating system, machine, network and the physical location. The initial vulnerability scans are next in the process and should utilize a wide range of reporting options visualize results by creation of a number of reports. The risks faced by Mercury USA and its transportation sector will be identified coupled with the severity of the identified vulnerabilities.
The vulnerability scans should be run quarterly in every year for low risks assets and once per month for high-risk assets. Hackers are constantly scanning the external assets daily and make reports on the vulnerability of the organization. There is need for the organization to have an automated assessment that identify vulnerability on systems, network and applications for weaknesses. The industry standard scanning tools include, Comodo cWatch, OpenVAS, Nexpose Community and Nikto scanners.
Part 2: Vulnerability Scanning Tool Evaluation and Recommendations
External scans were performed by a third-party penetration tester using the free tool Open Vulnerability Scanner (OpenVAS) that was allowed to assess the security orientation and network of Mercury USA. I consider Open Vulnerability Scanner (OpenVAS) to be an industry standard tool. As an external scanner, it offers the advantage of providing a free open-source vulnerability assessment tool, it has the common vulnerability and exposure coverage and it is built to be an all-in-one scanner. However, it supports less operating system, it does not offer policy managements and compared to other industry standard scan tools it has a smaller common vulnerability and exposure. The tool output is detailed and analytical in the identification of vulnerability. The tools provide enough reporting details that focus on the correct vulnerabilities. The report clearly identifies the most critical vulnerabilities. The report adequate provides mitigations for each vulnerability which makes the reports suitable for management. I would recommend the use of the tool and the automatic distribution of the report for Mercury USA.
Part 3: Business Case Example
An example of a business case where the company did not implement the recommendation of a VM process is Marriott International. The risks of the organization were still high even with a reputable firewall and antivirus software and an intrusion detection system. The problem of a misconfigured firewall was a major vulnerability as an antivirus catcher known viruses and trojan horses. The business experience data exfiltration, hacker intrusions and ransomware in the system and network of the organization vulnerable sections. The VM process recommended identify all major critical vulnerabilities to the security and provide mitigations for each in a detailed manner and can be applied automatically and regularly to be safe on a regular basis.
Closing
In conclusion, the important components of the VM process is the vulnerability scans and the key element is the tool of evaluation adopted by the company. Following the business case, it is important to implement the mitigations recommended for dealing with vulnerability for Mercury USA and cybersecurity attacks against the transportation sector. The implementation of more security tools and regular security scans will increase the overall security of Mercury USA that protect the organization against attacks, breaches and data loss.


Cybersecurity Threat Analyst
Mercury USA

References
Top 10 vulnerability assessment scanner. (2020, October 9). cWatch Blog. Retrieved from https://cwatch.comodo.com/blog/website-security/top-10-vulnerability-assessment-scanning-tools/
Farris, K. A., Shah, A., Cybenko, G., Ganesan, R., & Jajodia, S. (2018). Vulcon: A system for vulnerability prioritization, mitigation, and management. ACM Transactions on Privacy and Security (TOPS), 21(4), 1-28.
Kasprzyk, R., & Stachurski, A. (2016). A concept of standard-based vulnerability management automation for IT systems. Computer Science and Mathematical Modelling, (3), 33-38.

Order | Check Discount

Nursing Assignment Help For You!

Special Offer! Get 20-30% Off Your Order!

Why Seek Our Custom Writing Services

Every Student Wants Quality and That’s What We Deliver

Graduate Essay Writers

Only the most qualified writers are selected to be a part of our research and editorial team, with each possessing specialized knowledge in specific subjects and a background in academic writing.

Affordable Prices

Our prices strike the perfect balance between affordability and quality. We offer student-friendly rates that are competitive within the industry, without compromising on our high writing service standards.

100% Plagiarism-Free

No AI/chatgpt use. We write all our papers from scratch thus 0% similarity index. We scan every final draft before submitting it to a customer.

How it works

When you decide to place an order with Nursing Study Bay, here is what happens:

Fill the Order Form

You will complete our order form, filling in all of the fields and giving us as much guidelines - instruction details as possible.

Assignment of Writer

We assess your order and pair it with a skilled writer who possesses the specific qualifications for that subject. They then start the research/writing from scratch.

Order in Progress and Delivery

You and the assigned expert writer have direct communication throughout the process. Upon receiving the final draft, you can either approve it or request revisions.

Giving us Feedback (and other options)

We seek to understand your experience. You can also review testimonials from other clients, from where you can select your preferred professional writer to assist with your homework assignments.

For Similar Answers, Custom Essay Writing & Assignment Help Services

Find an expert by filling an order form for your nursing paper. We write AI-plagiarism free essays and case study analysis. Anytime!

Calculate the price of your order

You will get a personal manager and a discount.
We'll send you the first draft for approval by at
Total price:
$0.00