Design a Procedure to Perform a Vulnerability Assessment and Mitigation Strategies.
The NCU-FSB cybersecurity unit wants to implement an enterprise-wide SIEM for all business units with the goal of centralized management of logs and supporting wider ranges of network and security infrastructures. Before designing the strategy, the cybersecurity unit wants to assess the current state of the network perimeter and plans to perform a vulnerability assessment. As part of the risk-management plan you will design for your Signature Assignment in Week 8, you will design a vulnerability assessment procedure that includes an evaluation of industry tools that can assist in the process, data analysis, and reporting. Write a paper with diagrams included in which you will document the procedure to follow for enterprise systems vulnerability assessments.
In your paper, you should address the following:
An overview of the relevance of auditing and evaluating the current state of the network and systems.
Different types of SIEM and vulnerability assessment products.
Best SIEM products used in terms of:
Operating systems coverage
Wide coverage of network devices (such as Cisco)
Ability to provide a desktop and web management console
Provision of an advanced intelligence engine of forensic module
Ease of use for log management
Easier reporting capabilities
The procedure and flowchart to perform a vulnerability assessment.
Begin your assignment with a title page, and then an introduction, where you will state the purpose of the paper as part of the risk-management plan. Remember to cite your sources within the text of your document. End with a concluding paragraph, followed by the references page. If you have in-text citations, they must appear on the references page.