+1 (208) 254-6996 essayswallet@gmail.com
  

Your company recently reviewed the results of a penetration test on your network. Several vulnerabilities were identified, and the IT security management team has recommended mitigation. The manager has asked you to construct a plan of action and milestones (POA&M) given that the following vulnerabilities and mitigations were identified:

  • The penetration test showed that not all systems had malware protection software in place. The mitigation was to write a malware defense process to include all employees and retest the system after the process was implemented.
  • The penetration test indicated that the data server that houses employee payroll records had an admin password of “admin.” The mitigation was to perform extensive hardening of the data server.
  • The penetration test also identified many laptop computers that employees brought to work and connected to the internal network,some of which were easily compromised. The mitigation was to write a bring your own device (BYOD) policy for all employees and train the employees how to use their devices at work.

Complete the 1- to 2-page Plan of Action and Milestones Template.       (Must use this template!)

CYB/405 v2

Wk 5 Team Assignment Template

CYB/405 v2

Page 2 of 2

C:\Users\djshirey\OneDrive - University of Phoenix\F_Drive\Style Guides\UPX Logos\Horizontal format\UOPX_Sig_Hor_Black_Medium.png

Wk 5 Team – Plan of Action and Milestones Template

Review the assignment instructions in Blackboard and then complete the table.

Description of VulnerabilitySeverity CategoryMitigationScheduled Completion DateMilestones
<Describe vulnerability><CAT I, most severe and requires action within 30 daysCAT II, severe and requires action within 90 daysCAT III, vulnerabilities that will require action based on program timeline that may include financial resources><As described by IT security management team><Best guess based on the complexity of the vulnerability><Identify specific requirements to correct the identified vulnerability. There are usually several of these>

Copyright 2020 by University of Phoenix. All rights reserved.

Copyright 2020 by University of Phoenix. All rights reserved.