KIT215 Cybersecurity and Ethical Hacking Assignment Answer

KIT215 Cybersecurity and Ethical Hacking Assignment

Do you need management Assignment help and looking for KIT215 Cybersecurity and Ethical Hacking Assignment Answer? Get your answer at Assignment Task through our subject matter experts who work with their full genuine efforts. No matter what, wherever you are staying in Australia, our experts work round the clock. We offer free management Assignment samples and PDFs. Here you will get your answer in a well-formatted manner with a guaranteed of 100% plagiarism free work.

Order Now

ASSIGNMENT DETAILS:

  • Referencing Styles : Open
  • Pages : 1750
  • Course Code: KIT215
  • Course Title: cybersecurity and ethical hacking
  • University: University of Tasmania
  • Country: AU

 

QUESTION:

In this assignment, you will play the role of an independent security consultant engaged by an SME (Small-to-Medium Enterprise) to plan a vulnerability assessment exercise.

There are two deliverables — a Parameters and Scope document, and a Vulnerability Assessment Plan. A preliminary version of the Parameters and Scope document is due first. You’ll be given feedback on this, and you’ll have the opportunity to revise it (if you wish). You’ll develop the Vulnerability Assessment Plan based on the revised Parameters and Scope document, and then submit both documents for assessment.

The Parameters and Scope Document

To prepare for a vulnerability assessment, you would normally talk to the business to find out as much as possible about them, well before you would start planning the assessment itself. During this “discovery” process, you would ask questions about the size of the business, how many offices they have, how many staff they have, what sorts of customers they serve, how geographically distributed they are, how many devices (computers, servers, mobile devices, etc.) they have, what sort of software and services they run, how broad or how focused they want the assessment to be, whether they’ve had assessments or penetration tests done in the past, and so on.

Since this is a fictitious scenario, you don’t have any of that information, so somebody needs to invent it. Sometimes in exercises like this, a case study is supplied (or developed as part of the exercise) to provide as much of this background information as possible.