Vulnerability-Report Writing - IT Computer Science Assignment Help

Download Solution Order New Solution

Assignment Task

The coursework for this module is to write a report on ONE vulnerability test that you conducted on an operating system on a virtual machine. You may choose any type of vulnerability testing; however, you will need to have agreement from your module tutor/s in order to proceed. Please be aware that some of the techniques for performing this work are only taught at the end of the module so it would be wise to do some research beforehand into ONE vulnerability so that you can perform the tests as soon as you gain the necessary skills.

 

Report Structure

Introduction

The introduction must provide a brief overview of the report, it should include a brief description of the type of vulnerability test you will perform and a description of the vulnerability you are investigating.

Research into Vulnerabilities

This section needs to provide some evidence that you have conducted research into vulnerabilities associated with your chosen OS. You need to briefly describe the vulnerability you are intending to investigate; your research should also include possible remedies to this vulnerability. Clearly state the CVE reference number of the selected one.

Vulnerability Test Rationale

Provide a brief justification of the vulnerability test you intend to perform, what information or intelligence will the test provide you, how can it provide you with a strategy for mitigating against the effects of your chosen vulnerability.

Methodology

Provide detailed evidence of how the vulnerability testing was conducted. You may wish to use screenshots with descriptions for this part of your report. Make sure that the screenshots are of a suitable size and easily readable.

Detailed Findings

(This section may be put into a table)

For the vulnerability you found, give a description of the following:

Source of the vulnerability

Describe the source and root cause of the vulnerability. This may be in OS software or software commonly installed and used, for example, MS Office, or it could be a protocol like NetBios or TCP.

Impact of the vulnerability

Give an assessment of the impact if the vulnerability was exploited

Likelihood of the vulnerability being exploited

Give an assessment of the probability of the vulnerability being exploited.  

Overall Risk Assessment

Give a summary of your overall assessment of the vulnerability you have discovered.

Recommendations

Give your recommendations for dealing with and removing the vulnerability you have found and described in your report.

Appendix

Any information relevant to the vulnerability testing.

References

Provide a list of references; this may include books, journals, web sources or other. YOUR REFERENCES MUST BE IN THE HARVARD REFERENCING FORMAT.

 

This IT Computer Science Assignment has been solved by our IT Computer Science Experts at My Uni Papers. Our Assignment Writing Experts are efficient to provide a fresh solution to this question. We are serving more than 10000+ Students in Australia, UK & US by helping them to score HD in their academics. Our Experts are well trained to follow all marking rubrics & referencing Style. Be it a used or new solution, the quality of the work submitted by our assignment experts remains unhampered.

You may continue to expect the same or even better quality with the used and new assignment solution files respectively. There’s one thing to be noticed that you could choose one between the two and acquire an HD either way. You could choose a new assignment solution file to get yourself an exclusive, plagiarism (with free Turn tin file), expert quality assignment or order an old solution file that was considered worthy of the highest distinction.

Get It Done! Today

Country
Applicable Time Zone is AEST [Sydney, NSW] (GMT+11)
+

Every Assignment. Every Solution. Instantly. Deadline Ahead? Grab Your Sample Now.