/* Center data in "Value" column */ #rubric-responsive tbody > tr > :last-child { text-align: center; }
/* Style first column like header row in case <th> isn't used */ #rubric-responsive tbody > tr > :nth-child(1) { font-weight: bold; text-align: center; }
/* right align total: text */ #rubric-responsive tbody > tr:last-child > :nth-child(1) { font-weight: bold; text-align: right; }
/* Remove border from table and center it on screen */ #rubric-responsive table { border: none; margin-left: auto; margin-right: auto; margin-top: 20px; }
#rubric-responsive td:before { /* Bring "data-title" attribute into table cells */ content: attr(data-attr); /* display it as inline block so it doesn't interfere with <td> */ display: inline-block; /* make it take up it's entire "row" */ width: 100%; /* bold font so it looks like a th */ font-weight: bold; }
/* Remove "data-title" attribute from first child <td> cells */ /* this removes "Criteria" from the Total row, and will remove criteria from any <td> cells that should be <th> */ #rubric-responsive tbody>tr>td:first-child:before { content: none; }
/* Center data in "Value" column */ #rubric-responsive tbody > tr > :last-child { text-align: left; }
<style> img { float: right; margin-left: 20px; width: 38vw; } @media only screen and (max-width: 800px) { img { float:none; align: center; width:100vw; display: block; margin-left: auto; margin-right: auto; } </style> </head> <body> <h1>CYB 240 Project One Milestone Guidelines and Rubric</h1> <p><strong>Vulnerability Mitigation Report</strong></p> <!--Begin copy to add more sections. Use appropriate heading tags for subsections--> <h2>Overview</h2> <p>Working within a team to identify vulnerabilities is a daily occurrence for a cybersecurity analyst. Being able to analyze vulnerability reports and help the security team mitigate the vulnerabilities is essential. Making system-wide updates and changes can be both good and bad. It is good to fix issues, but you have to make sure you don’t break anything in the process.</p> <p>The purpose of this assignment is to walk you through how to read and interpret vulnerability analysis scan (OpenVAS) reports and how to identify vulnerabilities from them. The vulnerabilities that you identify for this assignment will be used in <strong>Project One</strong>, which will be submitted in <strong>Module Six</strong>. The scenario below is the same one you will use in your project as well.</p> <h2>Scenario</h2> <p>You are a cybersecurity analyst working for an IT company that is having issues with its computer systems. The company has supplied you with OpenVAS reports that detail several issues with security. You will use the reports to identify the vulnerabilities that you will analyze for your project. The system you will be working with is three tiered with a database back-end server and a web server front end. The system contains both Windows and Linux components.</p> <h2>Prompt</h2> <p>Review the three OpenVAS reports generated from the Project One lab environment. They can be accessed by selecting the menu icon above your list of labs, as shown in the screenshot below. Note that you will not need to complete any work in the lab environment for this assignment. There is no Milestone One lab to complete.</p> <p><img src="course_documents/CYB240_ProjectOneMilestone_image.jpg" alt="To locate your OpenVAS reports, navigate to the menu icon above your list of labs and expand it to find your three reports." title="To locate your OpenVAS reports, navigate to the menu icon above your list of labs and expand it to find your three reports." data-d2l-editor-default-img-style="true" style="width: auto; max-width: 100vw; float: none; display: block; margin-left: auto; margin-right: auto;"></p> <p>Use the template provided for this milestone. An example has also been provided to give you additional details for this activity. The template and the example are linked in the Project One Milestone task in Module Four of your course.</p> <p>You must address the <strong>critical elements</strong> listed below.</p> <ol type="I"> <li><strong>Vulnerability Mitigation Report</strong></li> <ol type="A"> <li><strong>Firewall OpenVAS Report</strong></li> <ol type="i"> <li>Select two vulnerabilities from the report for <strong>identification</strong>, including the CVSS number and the name of each vulnerability.</li> <li>Provide a <strong>description </strong>of each identified vulnerability, including its risks and CVE number(s) if applicable.</li> <li>Provide <strong>mitigation </strong>techniques for each vulnerability identified.</li> </ol> <li><strong>Windows Server OpenVAS Report</strong></li> <ol type="i"> <li>Select two vulnerabilities from the report for <strong>identification</strong>, including the CVSS number and the name of each vulnerability.</li> <li>Provide a <strong>description </strong>of each identified vulnerability, including its risks and CVE number(s) if applicable.</li> <li>Provide <strong>mitigation </strong>techniques for each vulnerability identified.</li> </ol> <li><strong>Ubuntu Server OpenVAS Report</strong></li> <ol type="i"> <li>Select two vulnerabilities from the report for <strong>identification</strong>, including the CVSS number and the name of each vulnerability.</li> <li>Provide a <strong>description </strong>of each identified vulnerability, including its risks and CVE number(s) if applicable.</li> <li>Provide <strong>mitigation </strong>techniques for each vulnerability identified.</li> </ol> </ol> </ol> <!--End copy to add section-> <!--Do NOT change text for "What to Submit" heading--> <h2>What to Submit</h2> <p>Submit your completed template. Use a file name that includes the course code, the assignment title, and your name—for example, CYB_123_Assignment_Firstname_Lastname.docx.</p> <h2 style="text-align: center;">Project One Milestone Rubric</h2> <div id="rubric-responsive"> <table> <thead> <tr><!--Do NOT change text for "Criteria" column heading--> <th class="table-borderless" scope="col">Criteria</th> <th scope="col">Proficient (100%)</th> <th scope="col">Needs Improvement (55%)</th> <th scope="col">Not Evident (0%)</th> <!--Do NOT change text for "Value" column heading--> <th scope="col">Value</th> </tr> </thead> <tbody><!--Begin copy to add ROWS. Update "td data-attr=" to match table headings exactly before copying and pasting.--> <tr> <th scope="row">Firewall OpenVAS Report: Identification</th> <td data-attr="Proficient (100%)">Selects two vulnerabilities from the report for identification, including the CVSS number and the name of each vulnerability</td> <td data-attr="Needs Improvement (55%)">Addresses “Proficient” criteria, but there are gaps in clarity, logic, or detail</td> <td data-attr="Not Evident (0%)">Does not address critical element, or response is irrelevant</td> <td data-attr="Value">10</td> </tr> <tr> <th scope="row">Firewall OpenVAS Report: Description</th> <td data-attr="Proficient (100%)">Provides a description of each identified vulnerability, including its risks and CVE number(s) if applicable</td> <td data-attr="Needs Improvement (55%)">Addresses “Proficient” criteria, but there are gaps in clarity, logic, or detail</td> <td data-attr="Not Evident (0%)">Does not address critical element, or response is irrelevant</td> <td data-attr="Value">10</td> </tr> <tr> <th scope="row">Firewall OpenVAS Report: Mitigation</th> <td data-attr="Proficient (100%)">Provides mitigation techniques for each vulnerability identified</td> <td data-attr="Needs Improvement (55%)">Addresses “Proficient” criteria, but there are gaps in clarity, logic, or detail</td> <td data-attr="Not Evident (0%)">Does not address critical element, or response is irrelevant</td> <td data-attr="Value">10</td> </tr> <tr> <th scope="row">Windows Server OpenVAS Report: Identification</th> <td data-attr="Proficient (100%)">Selects two vulnerabilities from the report for identification, including the CVSS number and the name of each vulnerability</td> <td data-attr="Needs Improvement (55%)">Addresses “Proficient” criteria, but there are gaps in clarity, logic, or detail</td> <td data-attr="Not Evident (0%)">Does not address critical element, or response is irrelevant</td> <td data-attr="Value">10</td> </tr> <tr> <th scope="row">Windows Server OpenVAS Report: Description</th> <td data-attr="Proficient (100%)">Provides a description of each identified vulnerability, including its risks and CVE number(s) if applicable</td> <td data-attr="Needs Improvement (55%)">Addresses “Proficient” criteria, but there are gaps in clarity, logic, or detail</td> <td data-attr="Not Evident (0%)">Does not address critical element, or response is irrelevant</td> <td data-attr="Value">10</td> </tr> <tr> <th scope="row">Windows Server OpenVAS Report: Mitigation</th> <td data-attr="Proficient (100%)">Provides mitigation techniques for each vulnerability identified</td> <td data-attr="Needs Improvement (55%)">Addresses “Proficient” criteria, but there are gaps in clarity, logic, or detail</td> <td data-attr="Not Evident (0%)">Does not address critical element, or response is irrelevant</td> <td data-attr="Value">10</td> </tr> <tr> <th scope="row">Ubuntu Server OpenVAS Report: Identification</th> <td data-attr="Proficient (100%)">Selects two vulnerabilities from the report for identification, including the CVSS number and the name of each vulnerability</td> <td data-attr="Needs Improvement (55%)">Addresses “Proficient” criteria, but there are gaps in clarity, logic, or detail</td> <td data-attr="Not Evident (0%)">Does not address critical element, or response is irrelevant</td> <td data-attr="Value">10</td> </tr> <tr> <th scope="row">Ubuntu Server OpenVAS Report: Description</th> <td data-attr="Proficient (100%)">Provides a description of each identified vulnerability, including its risks and CVE number(s) if applicable</td> <td data-attr="Needs Improvement (55%)">Addresses “Proficient” criteria, but there are gaps in clarity, logic, or detail</td> <td data-attr="Not Evident (0%)">Does not address critical element, or response is irrelevant</td> <td data-attr="Value">10</td> </tr> <tr> <th scope="row">Ubuntu Server OpenVAS Report: Mitigation</th> <td data-attr="Proficient (100%)">Provides mitigation techniques for each vulnerability identified</td> <td data-attr="Needs Improvement (55%)">Addresses “Proficient” criteria, but there are gaps in clarity, logic, or detail</td> <td data-attr="Not Evident (0%)">Does not address critical element, or response is irrelevant</td> <td data-attr="Value">10</td> </tr> <tr> <th scope="row">Articulation of Response</th> <td data-attr="Proficient (100%)">Submission has no major errors related to citations, grammar, spelling, or organization</td> <td data-attr="Needs Improvement (55%)">Submission has some errors related to citations, grammar, spelling, or organization that negatively impact readability and articulation of main ideas</td> <td data-attr="Not Evident (0%)">Submission has critical errors related to citations, grammar, spelling, or organization that prevent understanding of ideas</td> <td data-attr="Value">10</td> </tr> <!--End copy to add ROWS--> <!--Paste additional ROWS here.--> <tr><!--Update "colspan" if columns are removed. Number should equal 1 less than total number of columns.--> <td colspan="4" style="text-align: right;">Total:</td> <td>100%</td> </tr> </tbody> </table> <p></p> </div> </body></html><!DOCTYPE html> <html lang="en"><head> <meta charset="UTF-8"> <meta name="viewport" content="width=device-width, initial-scale=1.0"> <meta http-equiv="X-UA-Compatible" content="ie=edge"> <title>Assignment Information</title>
/* Center data in "Value" column */ #rubric-responsive tbody > tr > :last-child { text-align: center; }
/* Style first column like header row in case <th> isn't used */ #rubric-responsive tbody > tr > :nth-child(1) { font-weight: bold; text-align: center; }
/* right align total: text */ #rubric-responsive tbody > tr:last-child > :nth-child(1) { font-weight: bold; text-align: right; }
/* Remove border from table and center it on screen */ #rubric-responsive table { border: none; margin-left: auto; margin-right: auto; margin-top: 20px; }
#rubric-responsive td:before { /* Bring "data-title" attribute into table cells */ content: attr(data-attr); /* display it as inline block so it doesn't interfere with <td> */ display: inline-block; /* make it take up it's entire "row" */ width: 100%; /* bold font so it looks like a th */ font-weight: bold; }
/* Remove "data-title" attribute from first child <td> cells */ /* this removes "Criteria" from the Total row, and will remove criteria from any <td> cells that should be <th> */ #rubric-responsive tbody>tr>td:first-child:before { content: none; }
/* Center data in "Value" column */ #rubric-responsive tbody > tr > :last-child { text-align: left; }
<style> img { float: right; margin-left: 20px; width: 38vw; } @media only screen and (max-width: 800px) { img { float:none; align: center; width:100vw; display: block; margin-left: auto; margin-right: auto; } </style> </head> <body> <h1>CYB 240 Project One Milestone Guidelines and Rubric</h1> <p><strong>Vulnerability Mitigation Report</strong></p> <!--Begin copy to add more sections. Use appropriate heading tags for subsections--> <h2>Overview</h2> <p>Working within a team to identify vulnerabilities is a daily occurrence for a cybersecurity analyst. Being able to analyze vulnerability reports and help the security team mitigate the vulnerabilities is essential. Making system-wide updates and changes can be both good and bad. It is good to fix issues, but you have to make sure you don’t break anything in the process.</p> <p>The purpose of this assignment is to walk you through how to read and interpret vulnerability analysis scan (OpenVAS) reports and how to identify vulnerabilities from them. The vulnerabilities that you identify for this assignment will be used in <strong>Project One</strong>, which will be submitted in <strong>Module Six</strong>. The scenario below is the same one you will use in your project as well.</p> <h2>Scenario</h2> <p>You are a cybersecurity analyst working for an IT company that is having issues with its computer systems. The company has supplied you with OpenVAS reports that detail several issues with security. You will use the reports to identify the vulnerabilities that you will analyze for your project. The system you will be working with is three tiered with a database back-end server and a web server front end. The system contains both Windows and Linux components.</p> <h2>Prompt</h2> <p>Review the three OpenVAS reports generated from the Project One lab environment. They can be accessed by selecting the menu icon above your list of labs, as shown in the screenshot below. Note that you will not need to complete any work in the lab environment for this assignment. There is no Milestone One lab to complete.</p> <p><img src="course_documents/CYB240_ProjectOneMilestone_image.jpg" alt="To locate your OpenVAS reports, navigate to the menu icon above your list of labs and expand it to find your three reports." title="To locate your OpenVAS reports, navigate to the menu icon above your list of labs and expand it to find your three reports." data-d2l-editor-default-img-style="true" style="width: auto; max-width: 100vw; float: none; display: block; margin-left: auto; margin-right: auto;"></p> <p>Use the template provided for this milestone. An example has also been provided to give you additional details for this activity. The template and the example are linked in the Project One Milestone task in Module Four of your course.</p> <p>You must address the <strong>critical elements</strong> listed below.</p> <ol type="I"> <li><strong>Vulnerability Mitigation Report</strong></li> <ol type="A"> <li><strong>Firewall OpenVAS Report</strong></li> <ol type="i"> <li>Select two vulnerabilities from the report for <strong>identification</strong>, including the CVSS number and the name of each vulnerability.</li> <li>Provide a <strong>description </strong>of each identified vulnerability, including its risks and CVE number(s) if applicable.</li> <li>Provide <strong>mitigation </strong>techniques for each vulnerability identified.</li> </ol> <li><strong>Windows Server OpenVAS Report</strong></li> <ol type="i"> <li>Select two vulnerabilities from the report for <strong>identification</strong>, including the CVSS number and the name of each vulnerability.</li> <li>Provide a <strong>description </strong>of each identified vulnerability, including its risks and CVE number(s) if applicable.</li> <li>Provide <strong>mitigation </strong>techniques for each vulnerability identified.</li> </ol> <li><strong>Ubuntu Server OpenVAS Report</strong></li> <ol type="i"> <li>Select two vulnerabilities from the report for <strong>identification</strong>, including the CVSS number and the name of each vulnerability.</li> <li>Provide a <strong>description </strong>of each identified vulnerability, including its risks and CVE number(s) if applicable.</li> <li>Provide <strong>mitigation </strong>techniques for each vulnerability identified.</li> </ol> </ol> </ol> <!--End copy to add section-> <!--Do NOT change text for "What to Submit" heading--> <h2>What to Submit</h2> <p>Submit your completed template. Use a file name that includes the course code, the assignment title, and your name—for example, CYB_123_Assignment_Firstname_Lastname.docx.</p> <h2 style="text-align: center;">Project One Milestone Rubric</h2> <div id="rubric-responsive"> <table> <thead> <tr><!--Do NOT change text for "Criteria" column heading--> <th class="table-borderless" scope="col">Criteria</th> <th scope="col">Proficient (100%)</th> <th scope="col">Needs Improvement (55%)</th> <th scope="col">Not Evident (0%)</th> <!--Do NOT change text for "Value" column heading--> <th scope="col">Value</th> </tr> </thead> <tbody><!--Begin copy to add ROWS. Update "td data-attr=" to match table headings exactly before copying and pasting.--> <tr> <th scope="row">Firewall OpenVAS Report: Identification</th> <td data-attr="Proficient (100%)">Selects two vulnerabilities from the report for identification, including the CVSS number and the name of each vulnerability</td> <td data-attr="Needs Improvement (55%)">Addresses “Proficient” criteria, but there are gaps in clarity, logic, or detail</td> <td data-attr="Not Evident (0%)">Does not address critical element, or response is irrelevant</td> <td data-attr="Value">10</td> </tr> <tr> <th scope="row">Firewall OpenVAS Report: Description</th> <td data-attr="Proficient (100%)">Provides a description of each identified vulnerability, including its risks and CVE number(s) if applicable</td> <td data-attr="Needs Improvement (55%)">Addresses “Proficient” criteria, but there are gaps in clarity, logic, or detail</td> <td data-attr="Not Evident (0%)">Does not address critical element, or response is irrelevant</td> <td data-attr="Value">10</td> </tr> <tr> <th scope="row">Firewall OpenVAS Report: Mitigation</th> <td data-attr="Proficient (100%)">Provides mitigation techniques for each vulnerability identified</td> <td data-attr="Needs Improvement (55%)">Addresses “Proficient” criteria, but there are gaps in clarity, logic, or detail</td> <td data-attr="Not Evident (0%)">Does not address critical element, or response is irrelevant</td> <td data-attr="Value">10</td> </tr> <tr> <th scope="row">Windows Server OpenVAS Report: Identification</th> <td data-attr="Proficient (100%)">Selects two vulnerabilities from the report for identification, including the CVSS number and the name of each vulnerability</td> <td data-attr="Needs Improvement (55%)">Addresses “Proficient” criteria, but there are gaps in clarity, logic, or detail</td> <td data-attr="Not Evident (0%)">Does not address critical element, or response is irrelevant</td> <td data-attr="Value">10</td> </tr> <tr> <th scope="row">Windows Server OpenVAS Report: Description</th> <td data-attr="Proficient (100%)">Provides a description of each identified vulnerability, including its risks and CVE number(s) if applicable</td> <td data-attr="Needs Improvement (55%)">Addresses “Proficient” criteria, but there are gaps in clarity, logic, or detail</td> <td data-attr="Not Evident (0%)">Does not address critical element, or response is irrelevant</td> <td data-attr="Value">10</td> </tr> <tr> <th scope="row">Windows Server OpenVAS Report: Mitigation</th> <td data-attr="Proficient (100%)">Provides mitigation techniques for each vulnerability identified</td> <td data-attr="Needs Improvement (55%)">Addresses “Proficient” criteria, but there are gaps in clarity, logic, or detail</td> <td data-attr="Not Evident (0%)">Does not address critical element, or response is irrelevant</td> <td data-attr="Value">10</td> </tr> <tr> <th scope="row">Ubuntu Server OpenVAS Report: Identification</th> <td data-attr="Proficient (100%)">Selects two vulnerabilities from the report for identification, including the CVSS number and the name of each vulnerability</td> <td data-attr="Needs Improvement (55%)">Addresses “Proficient” criteria, but there are gaps in clarity, logic, or detail</td> <td data-attr="Not Evident (0%)">Does not address critical element, or response is irrelevant</td> <td data-attr="Value">10</td> </tr> <tr> <th scope="row">Ubuntu Server OpenVAS Report: Description</th> <td data-attr="Proficient (100%)">Provides a description of each identified vulnerability, including its risks and CVE number(s) if applicable</td> <td data-attr="Needs Improvement (55%)">Addresses “Proficient” criteria, but there are gaps in clarity, logic, or detail</td> <td data-attr="Not Evident (0%)">Does not address critical element, or response is irrelevant</td> <td data-attr="Value">10</td> </tr> <tr> <th scope="row">Ubuntu Server OpenVAS Report: Mitigation</th> <td data-attr="Proficient (100%)">Provides mitigation techniques for each vulnerability identified</td> <td data-attr="Needs Improvement (55%)">Addresses “Proficient” criteria, but there are gaps in clarity, logic, or detail</td> <td data-attr="Not Evident (0%)">Does not address critical element, or response is irrelevant</td> <td data-attr="Value">10</td> </tr> <tr> <th scope="row">Articulation of Response</th> <td data-attr="Proficient (100%)">Submission has no major errors related to citations, grammar, spelling, or organization</td> <td data-attr="Needs Improvement (55%)">Submission has some errors related to citations, grammar, spelling, or organization that negatively impact readability and articulation of main ideas</td> <td data-attr="Not Evident (0%)">Submission has critical errors related to citations, grammar, spelling, or organization that prevent understanding of ideas</td> <td data-attr="Value">10</td> </tr> <!--End copy to add ROWS--> <!--Paste additional ROWS here.--> <tr><!--Update "colspan" if columns are removed. Number should equal 1 less than total number of columns.--> <td colspan="4" style="text-align: right;">Total:</td> <td>100%</td> </tr> </tbody> </table> <p></p> </div> </body></html>title>Assignment Information</title>
/* Center data in "Value" column */ #rubric-responsive tbody > tr > :last-child { text-align: center; }
/* Style first column like header row in case <th> isn't used */ #rubric-responsive tbody > tr > :nth-child(1) { font-weight: bold; text-align: center; }
/* right align total: text */ #rubric-responsive tbody > tr:last-child > :nth-child(1) { font-weight: bold; text-align: right; }
/* Remove border from table and center it on screen */ #rubric-responsive table { border: none; margin-left: auto; margin-right: auto; margin-top: 20px; }
#rubric-responsive td:before { /* Bring "data-title" attribute into table cells */ content: attr(data-attr); /* display it as inline block so it doesn't interfere with <td> */ display: inline-block; /* make it take up it's entire "row" */ width: 100%; /* bold font so it looks like a th */ font-weight: bold; }
/* Remove "data-title" attribute from first child <td> cells */ /* this removes "Criteria" from the Total row, and will remove criteria from any <td> cells that should be <th> */ #rubric-responsive tbody>tr>td:first-child:before { content: none; }
/* Center data in "Value" column */ #rubric-responsive tbody > tr > :last-child { text-align: left; }
<style> img { float: right; margin-left: 20px; width: 38vw; } @media only screen and (max-width: 800px) { img { float:none; align: center; width:100vw; display: block; margin-left: auto; margin-right: auto; } </style> </head> <body> <h1>CYB 240 Project One Milestone Guidelines and Rubric</h1> <p><strong>Vulnerability Mitigation Report</strong></p> <!--Begin copy to add more sections. Use appropriate heading tags for subsections--> <h2>Overview</h2> <p>Working within a team to identify vulnerabilities is a daily occurrence for a cybersecurity analyst. Being able to analyze vulnerability reports and help the security team mitigate the vulnerabilities is essential. Making system-wide updates and changes can be both good and bad. It is good to fix issues, but you have to make sure you don’t break anything in the process.</p> <p>The purpose of this assignment is to walk you through how to read and interpret vulnerability analysis scan (OpenVAS) reports and how to identify vulnerabilities from them. The vulnerabilities that you identify for this assignment will be used in <strong>Project One</strong>, which will be submitted in <strong>Module Six</strong>. The scenario below is the same one you will use in your project as well.</p> <h2>Scenario</h2> <p>You are a cybersecurity analyst working for an IT company that is having issues with its computer systems. The company has supplied you with OpenVAS reports that detail several issues with security. You will use the reports to identify the vulnerabilities that you will analyze for your project. The system you will be working with is three tiered with a database back-end server and a web server front end. The system contains both Windows and Linux components.</p> <h2>Prompt</h2> <p>Review the three OpenVAS reports generated from the Project One lab environment. They can be accessed by selecting the menu icon above your list of labs, as shown in the screenshot below. Note that you will not need to complete any work in the lab environment for this assignment. There is no Milestone One lab to complete.</p> <p><img src="course_documents/CYB240_ProjectOneMilestone_image.jpg" alt="To locate your OpenVAS reports, navigate to the menu icon above your list of labs and expand it to find your three reports." title="To locate your OpenVAS reports, navigate to the menu icon above your list of labs and expand it to find your three reports." data-d2l-editor-default-img-style="true" style="width: auto; max-width: 100vw; float: none; display: block; margin-left: auto; margin-right: auto;"></p> <p>Use the template provided for this milestone. An example has also been provided to give you additional details for this activity. The template and the example are linked in the Project One Milestone task in Module Four of your course.</p> <p>You must address the <strong>critical elements</strong> listed below.</p> <ol type="I"> <li><strong>Vulnerability Mitigation Report</strong></li> <ol type="A"> <li><strong>Firewall OpenVAS Report</strong></li> <ol type="i"> <li>Select two vulnerabilities from the report for <strong>identification</strong>, including the CVSS number and the name of each vulnerability.</li> <li>Provide a <strong>description </strong>of each identified vulnerability, including its risks and CVE number(s) if applicable.</li> <li>Provide <strong>mitigation </strong>techniques for each vulnerability identified.</li> </ol> <li><strong>Windows Server OpenVAS Report</strong></li> <ol type="i"> <li>Select two vulnerabilities from the report for <strong>identification</strong>, including the CVSS number and the name of each vulnerability.</li> <li>Provide a <strong>description </strong>of each identified vulnerability, including its risks and CVE number(s) if applicable.</li> <li>Provide <strong>mitigation </strong>techniques for each vulnerability identified.</li> </ol> <li><strong>Ubuntu Server OpenVAS Report</strong></li> <ol type="i"> <li>Select two vulnerabilities from the report for <strong>identification</strong>, including the CVSS number and the name of each vulnerability.</li> <li>Provide a <strong>description </strong>of each identified vulnerability, including its risks and CVE number(s) if applicable.</li> <li>Provide <strong>mitigation </strong>techniques for each vulnerability identified.</li> </ol> </ol> </ol> <!--End copy to add section-> <!--Do NOT change text for "What to Submit" heading--> <h2>What to Submit</h2> <p>Submit your completed template. Use a file name that includes the course code, the assignment title, and your name—for example, CYB_123_Assignment_Firstname_Lastname.docx.</p> <h2 style="text-align: center;">Project One Milestone Rubric</h2> <div id="rubric-responsive"> <table> <thead> <tr><!--Do NOT change text for "Criteria" column heading--> <th class="table-borderless" scope="col">Criteria</th> <th scope="col">Proficient (100%)</th> <th scope="col">Needs Improvement (55%)</th> <th scope="col">Not Evident (0%)</th> <!--Do NOT change text for "Value" column heading--> <th scope="col">Value</th> </tr> </thead> <tbody><!--Begin copy to add ROWS. Update "td data-attr=" to match table headings exactly before copying and pasting.--> <tr> <th scope="row">Firewall OpenVAS Report: Identification</th> <td data-attr="Proficient (100%)">Selects two vulnerabilities from the report for identification, including the CVSS number and the name of each vulnerability</td> <td data-attr="Needs Improvement (55%)">Addresses “Proficient” criteria, but there are gaps in clarity, logic, or detail</td> <td data-attr="Not Evident (0%)">Does not address critical element, or response is irrelevant</td> <td data-attr="Value">10</td> </tr> <tr> <th scope="row">Firewall OpenVAS Report: Description</th> <td data-attr="Proficient (100%)">Provides a description of each identified vulnerability, including its risks and CVE number(s) if applicable</td> <td data-attr="Needs Improvement (55%)">Addresses “Proficient” criteria, but there are gaps in clarity, logic, or detail</td> <td data-attr="Not Evident (0%)">Does not address critical element, or response is irrelevant</td> <td data-attr="Value">10</td> </tr> <tr> <th scope="row">Firewall OpenVAS Report: Mitigation</th> <td data-attr="Proficient (100%)">Provides mitigation techniques for each vulnerability identified</td> <td data-attr="Needs Improvement (55%)">Addresses “Proficient” criteria, but there are gaps in clarity, logic, or detail</td> <td data-attr="Not Evident (0%)">Does not address critical element, or response is irrelevant</td> <td data-attr="Value">10</td> </tr> <tr> <th scope="row">Windows Server OpenVAS Report: Identification</th> <td data-attr="Proficient (100%)">Selects two vulnerabilities from the report for identification, including the CVSS number and the name of each vulnerability</td> <td data-attr="Needs Improvement (55%)">Addresses “Proficient” criteria, but there are gaps in clarity, logic, or detail</td> <td data-attr="Not Evident (0%)">Does not address critical element, or response is irrelevant</td> <td data-attr="Value">10</td> </tr> <tr> <th scope="row">Windows Server OpenVAS Report: Description</th> <td data-attr="Proficient (100%)">Provides a description of each identified vulnerability, including its risks and CVE number(s) if applicable</td> <td data-attr="Needs Improvement (55%)">Addresses “Proficient” criteria, but there are gaps in clarity, logic, or detail</td> <td data-attr="Not Evident (0%)">Does not address critical element, or response is irrelevant</td> <td data-attr="Value">10</td> </tr> <tr> <th scope="row">Windows Server OpenVAS Report: Mitigation</th> <td data-attr="Proficient (100%)">Provides mitigation techniques for each vulnerability identified</td> <td data-attr="Needs Improvement (55%)">Addresses “Proficient” criteria, but there are gaps in clarity, logic, or detail</td> <td data-attr="Not Evident (0%)">Does not address critical element, or response is irrelevant</td> <td data-attr="Value">10</td> </tr> <tr> <th scope="row">Ubuntu Server OpenVAS Report: Identification</th> <td data-attr="Proficient (100%)">Selects two vulnerabilities from the report for identification, including the CVSS number and the name of each vulnerability</td> <td data-attr="Needs Improvement (55%)">Addresses “Proficient” criteria, but there are gaps in clarity, logic, or detail</td> <td data-attr="Not Evident (0%)">Does not address critical element, or response is irrelevant</td> <td data-attr="Value">10</td> </tr> <tr> <th scope="row">Ubuntu Server OpenVAS Report: Description</th> <td data-attr="Proficient (100%)">Provides a description of each identified vulnerability, including its risks and CVE number(s) if applicable</td> <td data-attr="Needs Improvement (55%)">Addresses “Proficient” criteria, but there are gaps in clarity, logic, or detail</td> <td data-attr="Not Evident (0%)">Does not address critical element, or response is irrelevant</td> <td data-attr="Value">10</td> </tr> <tr> <th scope="row">Ubuntu Server OpenVAS Report: Mitigation</th> <td data-attr="Proficient (100%)">Provides mitigation techniques for each vulnerability identified</td> <td data-attr="Needs Improvement (55%)">Addresses “Proficient” criteria, but there are gaps in clarity, logic, or detail</td> <td data-attr="Not Evident (0%)">Does not address critical element, or response is irrelevant</td> <td data-attr="Value">10</td> </tr> <tr> <th scope="row">Articulation of Response</th> <td data-attr="Proficient (100%)">Submission has no major errors related to citations, grammar, spelling, or organization</td> <td data-attr="Needs Improvement (55%)">Submission has some errors related to citations, grammar, spelling, or organization that negatively impact readability and articulation of main ideas</td> <td data-attr="Not Evident (0%)">Submission has critical errors related to citations, grammar, spelling, or organization that prevent understanding of ideas</td> <td data-attr="Value">10</td> </tr> <!--End copy to add ROWS--> <!--Paste additional ROWS here.--> <tr><!--Update "colspan" if columns are removed. Number should equal 1 less than total number of columns.--> <td colspan="4" style="text-align: right;">Total:</td> <td>100%</td> </tr> </tbody> </table> <p></p> </div> </body></html>
Not sure if your essay will get a good grade?
WE WILL WRITE DOWN YOUR ESSAY FAST AND PROFESSIONALLY!
The MSW Program at Roberts uses a multidimensional perspective to understand human behavior, functioning, and development across the lifespan. Human behavior and functioning do not occur in isolation but are influenced by a variety of factors across the personal, environmental, and time dimensions that interact with each other—think of these factors as a web of…
Question #1: Leadership Worth 2.5 pts (300 words)Go to the below website and complete the quiz to determine your leadership style:https://www.atlassian.com/blog/leadership/find-your-leadership-style-examplesThis is a very short quiz that will determine your leadership style as one of the following: Front-line LeaderPost-modern LeaderTransformational LeaderServant LeaderContrarian LeaderMeta-Modern LeaderThe website gives definitions of each type of leader. Summarize in 300…
Over the last 4 weeks, we have examined many issues in healthcare policy and politics. Some of them were unique to the US and some of them impacted the world’s populations. For this assignment, you are to pick one of those issues and a country outside of the US to research and write about. NOTE:…
Purpose and Scoring Rubric ? Not sure if your essay will get a good grade? WE WILL WRITE DOWN YOUR ESSAYFAST AND PROFESSIONALLY! Order Now The purpose of this assignment is to provide an opportunity to share the results of the synthesis project with the student colleagues. This assignment is intended to allow you to…
Week 3 Field Education Journal Respond to the following in your journal for Week 3. Journal entries must total 350 to 700 words. Brief of what I did this week at my workplace. ? Not sure if your essay will get a good grade? WE WILL WRITE DOWN YOUR ESSAYFAST AND PROFESSIONALLY! Order Now I…
Assignment Instructions HIM 600 5-3 Final Project 1 Milestone Two: Draft of Technology and Policy Recommendations and Policy and Procedure Guide. For this milestone, you will submit a draft of Sections II (Technology and Policy Recommendations) and III (Policy and Procedure Guide) for the coding compliance program proposal (Final Project I). ? Not sure…