/* Center data in "Value" column */ #rubric-responsive tbody > tr > :last-child { text-align: center; }
/* Style first column like header row in case <th> isn't used */ #rubric-responsive tbody > tr > :nth-child(1) { font-weight: bold; text-align: center; }
/* right align total: text */ #rubric-responsive tbody > tr:last-child > :nth-child(1) { font-weight: bold; text-align: right; }
/* Remove border from table and center it on screen */ #rubric-responsive table { border: none; margin-left: auto; margin-right: auto; margin-top: 20px; }
#rubric-responsive td:before { /* Bring "data-title" attribute into table cells */ content: attr(data-attr); /* display it as inline block so it doesn't interfere with <td> */ display: inline-block; /* make it take up it's entire "row" */ width: 100%; /* bold font so it looks like a th */ font-weight: bold; }
/* Remove "data-title" attribute from first child <td> cells */ /* this removes "Criteria" from the Total row, and will remove criteria from any <td> cells that should be <th> */ #rubric-responsive tbody>tr>td:first-child:before { content: none; }
/* Center data in "Value" column */ #rubric-responsive tbody > tr > :last-child { text-align: left; }
<style> img { float: right; margin-left: 20px; width: 38vw; } @media only screen and (max-width: 800px) { img { float:none; align: center; width:100vw; display: block; margin-left: auto; margin-right: auto; } </style> </head> <body> <h1>CYB 240 Project One Milestone Guidelines and Rubric</h1> <p><strong>Vulnerability Mitigation Report</strong></p> <!--Begin copy to add more sections. Use appropriate heading tags for subsections--> <h2>Overview</h2> <p>Working within a team to identify vulnerabilities is a daily occurrence for a cybersecurity analyst. Being able to analyze vulnerability reports and help the security team mitigate the vulnerabilities is essential. Making system-wide updates and changes can be both good and bad. It is good to fix issues, but you have to make sure you don’t break anything in the process.</p> <p>The purpose of this assignment is to walk you through how to read and interpret vulnerability analysis scan (OpenVAS) reports and how to identify vulnerabilities from them. The vulnerabilities that you identify for this assignment will be used in <strong>Project One</strong>, which will be submitted in <strong>Module Six</strong>. The scenario below is the same one you will use in your project as well.</p> <h2>Scenario</h2> <p>You are a cybersecurity analyst working for an IT company that is having issues with its computer systems. The company has supplied you with OpenVAS reports that detail several issues with security. You will use the reports to identify the vulnerabilities that you will analyze for your project. The system you will be working with is three tiered with a database back-end server and a web server front end. The system contains both Windows and Linux components.</p> <h2>Prompt</h2> <p>Review the three OpenVAS reports generated from the Project One lab environment. They can be accessed by selecting the menu icon above your list of labs, as shown in the screenshot below. Note that you will not need to complete any work in the lab environment for this assignment. There is no Milestone One lab to complete.</p> <p><img src="course_documents/CYB240_ProjectOneMilestone_image.jpg" alt="To locate your OpenVAS reports, navigate to the menu icon above your list of labs and expand it to find your three reports." title="To locate your OpenVAS reports, navigate to the menu icon above your list of labs and expand it to find your three reports." data-d2l-editor-default-img-style="true" style="width: auto; max-width: 100vw; float: none; display: block; margin-left: auto; margin-right: auto;"></p> <p>Use the template provided for this milestone. An example has also been provided to give you additional details for this activity. The template and the example are linked in the Project One Milestone task in Module Four of your course.</p> <p>You must address the <strong>critical elements</strong> listed below.</p> <ol type="I"> <li><strong>Vulnerability Mitigation Report</strong></li> <ol type="A"> <li><strong>Firewall OpenVAS Report</strong></li> <ol type="i"> <li>Select two vulnerabilities from the report for <strong>identification</strong>, including the CVSS number and the name of each vulnerability.</li> <li>Provide a <strong>description </strong>of each identified vulnerability, including its risks and CVE number(s) if applicable.</li> <li>Provide <strong>mitigation </strong>techniques for each vulnerability identified.</li> </ol> <li><strong>Windows Server OpenVAS Report</strong></li> <ol type="i"> <li>Select two vulnerabilities from the report for <strong>identification</strong>, including the CVSS number and the name of each vulnerability.</li> <li>Provide a <strong>description </strong>of each identified vulnerability, including its risks and CVE number(s) if applicable.</li> <li>Provide <strong>mitigation </strong>techniques for each vulnerability identified.</li> </ol> <li><strong>Ubuntu Server OpenVAS Report</strong></li> <ol type="i"> <li>Select two vulnerabilities from the report for <strong>identification</strong>, including the CVSS number and the name of each vulnerability.</li> <li>Provide a <strong>description </strong>of each identified vulnerability, including its risks and CVE number(s) if applicable.</li> <li>Provide <strong>mitigation </strong>techniques for each vulnerability identified.</li> </ol> </ol> </ol> <!--End copy to add section-> <!--Do NOT change text for "What to Submit" heading--> <h2>What to Submit</h2> <p>Submit your completed template. Use a file name that includes the course code, the assignment title, and your name—for example, CYB_123_Assignment_Firstname_Lastname.docx.</p> <h2 style="text-align: center;">Project One Milestone Rubric</h2> <div id="rubric-responsive"> <table> <thead> <tr><!--Do NOT change text for "Criteria" column heading--> <th class="table-borderless" scope="col">Criteria</th> <th scope="col">Proficient (100%)</th> <th scope="col">Needs Improvement (55%)</th> <th scope="col">Not Evident (0%)</th> <!--Do NOT change text for "Value" column heading--> <th scope="col">Value</th> </tr> </thead> <tbody><!--Begin copy to add ROWS. Update "td data-attr=" to match table headings exactly before copying and pasting.--> <tr> <th scope="row">Firewall OpenVAS Report: Identification</th> <td data-attr="Proficient (100%)">Selects two vulnerabilities from the report for identification, including the CVSS number and the name of each vulnerability</td> <td data-attr="Needs Improvement (55%)">Addresses “Proficient” criteria, but there are gaps in clarity, logic, or detail</td> <td data-attr="Not Evident (0%)">Does not address critical element, or response is irrelevant</td> <td data-attr="Value">10</td> </tr> <tr> <th scope="row">Firewall OpenVAS Report: Description</th> <td data-attr="Proficient (100%)">Provides a description of each identified vulnerability, including its risks and CVE number(s) if applicable</td> <td data-attr="Needs Improvement (55%)">Addresses “Proficient” criteria, but there are gaps in clarity, logic, or detail</td> <td data-attr="Not Evident (0%)">Does not address critical element, or response is irrelevant</td> <td data-attr="Value">10</td> </tr> <tr> <th scope="row">Firewall OpenVAS Report: Mitigation</th> <td data-attr="Proficient (100%)">Provides mitigation techniques for each vulnerability identified</td> <td data-attr="Needs Improvement (55%)">Addresses “Proficient” criteria, but there are gaps in clarity, logic, or detail</td> <td data-attr="Not Evident (0%)">Does not address critical element, or response is irrelevant</td> <td data-attr="Value">10</td> </tr> <tr> <th scope="row">Windows Server OpenVAS Report: Identification</th> <td data-attr="Proficient (100%)">Selects two vulnerabilities from the report for identification, including the CVSS number and the name of each vulnerability</td> <td data-attr="Needs Improvement (55%)">Addresses “Proficient” criteria, but there are gaps in clarity, logic, or detail</td> <td data-attr="Not Evident (0%)">Does not address critical element, or response is irrelevant</td> <td data-attr="Value">10</td> </tr> <tr> <th scope="row">Windows Server OpenVAS Report: Description</th> <td data-attr="Proficient (100%)">Provides a description of each identified vulnerability, including its risks and CVE number(s) if applicable</td> <td data-attr="Needs Improvement (55%)">Addresses “Proficient” criteria, but there are gaps in clarity, logic, or detail</td> <td data-attr="Not Evident (0%)">Does not address critical element, or response is irrelevant</td> <td data-attr="Value">10</td> </tr> <tr> <th scope="row">Windows Server OpenVAS Report: Mitigation</th> <td data-attr="Proficient (100%)">Provides mitigation techniques for each vulnerability identified</td> <td data-attr="Needs Improvement (55%)">Addresses “Proficient” criteria, but there are gaps in clarity, logic, or detail</td> <td data-attr="Not Evident (0%)">Does not address critical element, or response is irrelevant</td> <td data-attr="Value">10</td> </tr> <tr> <th scope="row">Ubuntu Server OpenVAS Report: Identification</th> <td data-attr="Proficient (100%)">Selects two vulnerabilities from the report for identification, including the CVSS number and the name of each vulnerability</td> <td data-attr="Needs Improvement (55%)">Addresses “Proficient” criteria, but there are gaps in clarity, logic, or detail</td> <td data-attr="Not Evident (0%)">Does not address critical element, or response is irrelevant</td> <td data-attr="Value">10</td> </tr> <tr> <th scope="row">Ubuntu Server OpenVAS Report: Description</th> <td data-attr="Proficient (100%)">Provides a description of each identified vulnerability, including its risks and CVE number(s) if applicable</td> <td data-attr="Needs Improvement (55%)">Addresses “Proficient” criteria, but there are gaps in clarity, logic, or detail</td> <td data-attr="Not Evident (0%)">Does not address critical element, or response is irrelevant</td> <td data-attr="Value">10</td> </tr> <tr> <th scope="row">Ubuntu Server OpenVAS Report: Mitigation</th> <td data-attr="Proficient (100%)">Provides mitigation techniques for each vulnerability identified</td> <td data-attr="Needs Improvement (55%)">Addresses “Proficient” criteria, but there are gaps in clarity, logic, or detail</td> <td data-attr="Not Evident (0%)">Does not address critical element, or response is irrelevant</td> <td data-attr="Value">10</td> </tr> <tr> <th scope="row">Articulation of Response</th> <td data-attr="Proficient (100%)">Submission has no major errors related to citations, grammar, spelling, or organization</td> <td data-attr="Needs Improvement (55%)">Submission has some errors related to citations, grammar, spelling, or organization that negatively impact readability and articulation of main ideas</td> <td data-attr="Not Evident (0%)">Submission has critical errors related to citations, grammar, spelling, or organization that prevent understanding of ideas</td> <td data-attr="Value">10</td> </tr> <!--End copy to add ROWS--> <!--Paste additional ROWS here.--> <tr><!--Update "colspan" if columns are removed. Number should equal 1 less than total number of columns.--> <td colspan="4" style="text-align: right;">Total:</td> <td>100%</td> </tr> </tbody> </table> <p></p> </div> </body></html><!DOCTYPE html> <html lang="en"><head> <meta charset="UTF-8"> <meta name="viewport" content="width=device-width, initial-scale=1.0"> <meta http-equiv="X-UA-Compatible" content="ie=edge"> <title>Assignment Information</title>
/* Center data in "Value" column */ #rubric-responsive tbody > tr > :last-child { text-align: center; }
/* Style first column like header row in case <th> isn't used */ #rubric-responsive tbody > tr > :nth-child(1) { font-weight: bold; text-align: center; }
/* right align total: text */ #rubric-responsive tbody > tr:last-child > :nth-child(1) { font-weight: bold; text-align: right; }
/* Remove border from table and center it on screen */ #rubric-responsive table { border: none; margin-left: auto; margin-right: auto; margin-top: 20px; }
#rubric-responsive td:before { /* Bring "data-title" attribute into table cells */ content: attr(data-attr); /* display it as inline block so it doesn't interfere with <td> */ display: inline-block; /* make it take up it's entire "row" */ width: 100%; /* bold font so it looks like a th */ font-weight: bold; }
/* Remove "data-title" attribute from first child <td> cells */ /* this removes "Criteria" from the Total row, and will remove criteria from any <td> cells that should be <th> */ #rubric-responsive tbody>tr>td:first-child:before { content: none; }
/* Center data in "Value" column */ #rubric-responsive tbody > tr > :last-child { text-align: left; }
<style> img { float: right; margin-left: 20px; width: 38vw; } @media only screen and (max-width: 800px) { img { float:none; align: center; width:100vw; display: block; margin-left: auto; margin-right: auto; } </style> </head> <body> <h1>CYB 240 Project One Milestone Guidelines and Rubric</h1> <p><strong>Vulnerability Mitigation Report</strong></p> <!--Begin copy to add more sections. Use appropriate heading tags for subsections--> <h2>Overview</h2> <p>Working within a team to identify vulnerabilities is a daily occurrence for a cybersecurity analyst. Being able to analyze vulnerability reports and help the security team mitigate the vulnerabilities is essential. Making system-wide updates and changes can be both good and bad. It is good to fix issues, but you have to make sure you don’t break anything in the process.</p> <p>The purpose of this assignment is to walk you through how to read and interpret vulnerability analysis scan (OpenVAS) reports and how to identify vulnerabilities from them. The vulnerabilities that you identify for this assignment will be used in <strong>Project One</strong>, which will be submitted in <strong>Module Six</strong>. The scenario below is the same one you will use in your project as well.</p> <h2>Scenario</h2> <p>You are a cybersecurity analyst working for an IT company that is having issues with its computer systems. The company has supplied you with OpenVAS reports that detail several issues with security. You will use the reports to identify the vulnerabilities that you will analyze for your project. The system you will be working with is three tiered with a database back-end server and a web server front end. The system contains both Windows and Linux components.</p> <h2>Prompt</h2> <p>Review the three OpenVAS reports generated from the Project One lab environment. They can be accessed by selecting the menu icon above your list of labs, as shown in the screenshot below. Note that you will not need to complete any work in the lab environment for this assignment. There is no Milestone One lab to complete.</p> <p><img src="course_documents/CYB240_ProjectOneMilestone_image.jpg" alt="To locate your OpenVAS reports, navigate to the menu icon above your list of labs and expand it to find your three reports." title="To locate your OpenVAS reports, navigate to the menu icon above your list of labs and expand it to find your three reports." data-d2l-editor-default-img-style="true" style="width: auto; max-width: 100vw; float: none; display: block; margin-left: auto; margin-right: auto;"></p> <p>Use the template provided for this milestone. An example has also been provided to give you additional details for this activity. The template and the example are linked in the Project One Milestone task in Module Four of your course.</p> <p>You must address the <strong>critical elements</strong> listed below.</p> <ol type="I"> <li><strong>Vulnerability Mitigation Report</strong></li> <ol type="A"> <li><strong>Firewall OpenVAS Report</strong></li> <ol type="i"> <li>Select two vulnerabilities from the report for <strong>identification</strong>, including the CVSS number and the name of each vulnerability.</li> <li>Provide a <strong>description </strong>of each identified vulnerability, including its risks and CVE number(s) if applicable.</li> <li>Provide <strong>mitigation </strong>techniques for each vulnerability identified.</li> </ol> <li><strong>Windows Server OpenVAS Report</strong></li> <ol type="i"> <li>Select two vulnerabilities from the report for <strong>identification</strong>, including the CVSS number and the name of each vulnerability.</li> <li>Provide a <strong>description </strong>of each identified vulnerability, including its risks and CVE number(s) if applicable.</li> <li>Provide <strong>mitigation </strong>techniques for each vulnerability identified.</li> </ol> <li><strong>Ubuntu Server OpenVAS Report</strong></li> <ol type="i"> <li>Select two vulnerabilities from the report for <strong>identification</strong>, including the CVSS number and the name of each vulnerability.</li> <li>Provide a <strong>description </strong>of each identified vulnerability, including its risks and CVE number(s) if applicable.</li> <li>Provide <strong>mitigation </strong>techniques for each vulnerability identified.</li> </ol> </ol> </ol> <!--End copy to add section-> <!--Do NOT change text for "What to Submit" heading--> <h2>What to Submit</h2> <p>Submit your completed template. Use a file name that includes the course code, the assignment title, and your name—for example, CYB_123_Assignment_Firstname_Lastname.docx.</p> <h2 style="text-align: center;">Project One Milestone Rubric</h2> <div id="rubric-responsive"> <table> <thead> <tr><!--Do NOT change text for "Criteria" column heading--> <th class="table-borderless" scope="col">Criteria</th> <th scope="col">Proficient (100%)</th> <th scope="col">Needs Improvement (55%)</th> <th scope="col">Not Evident (0%)</th> <!--Do NOT change text for "Value" column heading--> <th scope="col">Value</th> </tr> </thead> <tbody><!--Begin copy to add ROWS. Update "td data-attr=" to match table headings exactly before copying and pasting.--> <tr> <th scope="row">Firewall OpenVAS Report: Identification</th> <td data-attr="Proficient (100%)">Selects two vulnerabilities from the report for identification, including the CVSS number and the name of each vulnerability</td> <td data-attr="Needs Improvement (55%)">Addresses “Proficient” criteria, but there are gaps in clarity, logic, or detail</td> <td data-attr="Not Evident (0%)">Does not address critical element, or response is irrelevant</td> <td data-attr="Value">10</td> </tr> <tr> <th scope="row">Firewall OpenVAS Report: Description</th> <td data-attr="Proficient (100%)">Provides a description of each identified vulnerability, including its risks and CVE number(s) if applicable</td> <td data-attr="Needs Improvement (55%)">Addresses “Proficient” criteria, but there are gaps in clarity, logic, or detail</td> <td data-attr="Not Evident (0%)">Does not address critical element, or response is irrelevant</td> <td data-attr="Value">10</td> </tr> <tr> <th scope="row">Firewall OpenVAS Report: Mitigation</th> <td data-attr="Proficient (100%)">Provides mitigation techniques for each vulnerability identified</td> <td data-attr="Needs Improvement (55%)">Addresses “Proficient” criteria, but there are gaps in clarity, logic, or detail</td> <td data-attr="Not Evident (0%)">Does not address critical element, or response is irrelevant</td> <td data-attr="Value">10</td> </tr> <tr> <th scope="row">Windows Server OpenVAS Report: Identification</th> <td data-attr="Proficient (100%)">Selects two vulnerabilities from the report for identification, including the CVSS number and the name of each vulnerability</td> <td data-attr="Needs Improvement (55%)">Addresses “Proficient” criteria, but there are gaps in clarity, logic, or detail</td> <td data-attr="Not Evident (0%)">Does not address critical element, or response is irrelevant</td> <td data-attr="Value">10</td> </tr> <tr> <th scope="row">Windows Server OpenVAS Report: Description</th> <td data-attr="Proficient (100%)">Provides a description of each identified vulnerability, including its risks and CVE number(s) if applicable</td> <td data-attr="Needs Improvement (55%)">Addresses “Proficient” criteria, but there are gaps in clarity, logic, or detail</td> <td data-attr="Not Evident (0%)">Does not address critical element, or response is irrelevant</td> <td data-attr="Value">10</td> </tr> <tr> <th scope="row">Windows Server OpenVAS Report: Mitigation</th> <td data-attr="Proficient (100%)">Provides mitigation techniques for each vulnerability identified</td> <td data-attr="Needs Improvement (55%)">Addresses “Proficient” criteria, but there are gaps in clarity, logic, or detail</td> <td data-attr="Not Evident (0%)">Does not address critical element, or response is irrelevant</td> <td data-attr="Value">10</td> </tr> <tr> <th scope="row">Ubuntu Server OpenVAS Report: Identification</th> <td data-attr="Proficient (100%)">Selects two vulnerabilities from the report for identification, including the CVSS number and the name of each vulnerability</td> <td data-attr="Needs Improvement (55%)">Addresses “Proficient” criteria, but there are gaps in clarity, logic, or detail</td> <td data-attr="Not Evident (0%)">Does not address critical element, or response is irrelevant</td> <td data-attr="Value">10</td> </tr> <tr> <th scope="row">Ubuntu Server OpenVAS Report: Description</th> <td data-attr="Proficient (100%)">Provides a description of each identified vulnerability, including its risks and CVE number(s) if applicable</td> <td data-attr="Needs Improvement (55%)">Addresses “Proficient” criteria, but there are gaps in clarity, logic, or detail</td> <td data-attr="Not Evident (0%)">Does not address critical element, or response is irrelevant</td> <td data-attr="Value">10</td> </tr> <tr> <th scope="row">Ubuntu Server OpenVAS Report: Mitigation</th> <td data-attr="Proficient (100%)">Provides mitigation techniques for each vulnerability identified</td> <td data-attr="Needs Improvement (55%)">Addresses “Proficient” criteria, but there are gaps in clarity, logic, or detail</td> <td data-attr="Not Evident (0%)">Does not address critical element, or response is irrelevant</td> <td data-attr="Value">10</td> </tr> <tr> <th scope="row">Articulation of Response</th> <td data-attr="Proficient (100%)">Submission has no major errors related to citations, grammar, spelling, or organization</td> <td data-attr="Needs Improvement (55%)">Submission has some errors related to citations, grammar, spelling, or organization that negatively impact readability and articulation of main ideas</td> <td data-attr="Not Evident (0%)">Submission has critical errors related to citations, grammar, spelling, or organization that prevent understanding of ideas</td> <td data-attr="Value">10</td> </tr> <!--End copy to add ROWS--> <!--Paste additional ROWS here.--> <tr><!--Update "colspan" if columns are removed. Number should equal 1 less than total number of columns.--> <td colspan="4" style="text-align: right;">Total:</td> <td>100%</td> </tr> </tbody> </table> <p></p> </div> </body></html>title>Assignment Information</title>
/* Center data in "Value" column */ #rubric-responsive tbody > tr > :last-child { text-align: center; }
/* Style first column like header row in case <th> isn't used */ #rubric-responsive tbody > tr > :nth-child(1) { font-weight: bold; text-align: center; }
/* right align total: text */ #rubric-responsive tbody > tr:last-child > :nth-child(1) { font-weight: bold; text-align: right; }
/* Remove border from table and center it on screen */ #rubric-responsive table { border: none; margin-left: auto; margin-right: auto; margin-top: 20px; }
#rubric-responsive td:before { /* Bring "data-title" attribute into table cells */ content: attr(data-attr); /* display it as inline block so it doesn't interfere with <td> */ display: inline-block; /* make it take up it's entire "row" */ width: 100%; /* bold font so it looks like a th */ font-weight: bold; }
/* Remove "data-title" attribute from first child <td> cells */ /* this removes "Criteria" from the Total row, and will remove criteria from any <td> cells that should be <th> */ #rubric-responsive tbody>tr>td:first-child:before { content: none; }
/* Center data in "Value" column */ #rubric-responsive tbody > tr > :last-child { text-align: left; }
<style> img { float: right; margin-left: 20px; width: 38vw; } @media only screen and (max-width: 800px) { img { float:none; align: center; width:100vw; display: block; margin-left: auto; margin-right: auto; } </style> </head> <body> <h1>CYB 240 Project One Milestone Guidelines and Rubric</h1> <p><strong>Vulnerability Mitigation Report</strong></p> <!--Begin copy to add more sections. Use appropriate heading tags for subsections--> <h2>Overview</h2> <p>Working within a team to identify vulnerabilities is a daily occurrence for a cybersecurity analyst. Being able to analyze vulnerability reports and help the security team mitigate the vulnerabilities is essential. Making system-wide updates and changes can be both good and bad. It is good to fix issues, but you have to make sure you don’t break anything in the process.</p> <p>The purpose of this assignment is to walk you through how to read and interpret vulnerability analysis scan (OpenVAS) reports and how to identify vulnerabilities from them. The vulnerabilities that you identify for this assignment will be used in <strong>Project One</strong>, which will be submitted in <strong>Module Six</strong>. The scenario below is the same one you will use in your project as well.</p> <h2>Scenario</h2> <p>You are a cybersecurity analyst working for an IT company that is having issues with its computer systems. The company has supplied you with OpenVAS reports that detail several issues with security. You will use the reports to identify the vulnerabilities that you will analyze for your project. The system you will be working with is three tiered with a database back-end server and a web server front end. The system contains both Windows and Linux components.</p> <h2>Prompt</h2> <p>Review the three OpenVAS reports generated from the Project One lab environment. They can be accessed by selecting the menu icon above your list of labs, as shown in the screenshot below. Note that you will not need to complete any work in the lab environment for this assignment. There is no Milestone One lab to complete.</p> <p><img src="course_documents/CYB240_ProjectOneMilestone_image.jpg" alt="To locate your OpenVAS reports, navigate to the menu icon above your list of labs and expand it to find your three reports." title="To locate your OpenVAS reports, navigate to the menu icon above your list of labs and expand it to find your three reports." data-d2l-editor-default-img-style="true" style="width: auto; max-width: 100vw; float: none; display: block; margin-left: auto; margin-right: auto;"></p> <p>Use the template provided for this milestone. An example has also been provided to give you additional details for this activity. The template and the example are linked in the Project One Milestone task in Module Four of your course.</p> <p>You must address the <strong>critical elements</strong> listed below.</p> <ol type="I"> <li><strong>Vulnerability Mitigation Report</strong></li> <ol type="A"> <li><strong>Firewall OpenVAS Report</strong></li> <ol type="i"> <li>Select two vulnerabilities from the report for <strong>identification</strong>, including the CVSS number and the name of each vulnerability.</li> <li>Provide a <strong>description </strong>of each identified vulnerability, including its risks and CVE number(s) if applicable.</li> <li>Provide <strong>mitigation </strong>techniques for each vulnerability identified.</li> </ol> <li><strong>Windows Server OpenVAS Report</strong></li> <ol type="i"> <li>Select two vulnerabilities from the report for <strong>identification</strong>, including the CVSS number and the name of each vulnerability.</li> <li>Provide a <strong>description </strong>of each identified vulnerability, including its risks and CVE number(s) if applicable.</li> <li>Provide <strong>mitigation </strong>techniques for each vulnerability identified.</li> </ol> <li><strong>Ubuntu Server OpenVAS Report</strong></li> <ol type="i"> <li>Select two vulnerabilities from the report for <strong>identification</strong>, including the CVSS number and the name of each vulnerability.</li> <li>Provide a <strong>description </strong>of each identified vulnerability, including its risks and CVE number(s) if applicable.</li> <li>Provide <strong>mitigation </strong>techniques for each vulnerability identified.</li> </ol> </ol> </ol> <!--End copy to add section-> <!--Do NOT change text for "What to Submit" heading--> <h2>What to Submit</h2> <p>Submit your completed template. Use a file name that includes the course code, the assignment title, and your name—for example, CYB_123_Assignment_Firstname_Lastname.docx.</p> <h2 style="text-align: center;">Project One Milestone Rubric</h2> <div id="rubric-responsive"> <table> <thead> <tr><!--Do NOT change text for "Criteria" column heading--> <th class="table-borderless" scope="col">Criteria</th> <th scope="col">Proficient (100%)</th> <th scope="col">Needs Improvement (55%)</th> <th scope="col">Not Evident (0%)</th> <!--Do NOT change text for "Value" column heading--> <th scope="col">Value</th> </tr> </thead> <tbody><!--Begin copy to add ROWS. Update "td data-attr=" to match table headings exactly before copying and pasting.--> <tr> <th scope="row">Firewall OpenVAS Report: Identification</th> <td data-attr="Proficient (100%)">Selects two vulnerabilities from the report for identification, including the CVSS number and the name of each vulnerability</td> <td data-attr="Needs Improvement (55%)">Addresses “Proficient” criteria, but there are gaps in clarity, logic, or detail</td> <td data-attr="Not Evident (0%)">Does not address critical element, or response is irrelevant</td> <td data-attr="Value">10</td> </tr> <tr> <th scope="row">Firewall OpenVAS Report: Description</th> <td data-attr="Proficient (100%)">Provides a description of each identified vulnerability, including its risks and CVE number(s) if applicable</td> <td data-attr="Needs Improvement (55%)">Addresses “Proficient” criteria, but there are gaps in clarity, logic, or detail</td> <td data-attr="Not Evident (0%)">Does not address critical element, or response is irrelevant</td> <td data-attr="Value">10</td> </tr> <tr> <th scope="row">Firewall OpenVAS Report: Mitigation</th> <td data-attr="Proficient (100%)">Provides mitigation techniques for each vulnerability identified</td> <td data-attr="Needs Improvement (55%)">Addresses “Proficient” criteria, but there are gaps in clarity, logic, or detail</td> <td data-attr="Not Evident (0%)">Does not address critical element, or response is irrelevant</td> <td data-attr="Value">10</td> </tr> <tr> <th scope="row">Windows Server OpenVAS Report: Identification</th> <td data-attr="Proficient (100%)">Selects two vulnerabilities from the report for identification, including the CVSS number and the name of each vulnerability</td> <td data-attr="Needs Improvement (55%)">Addresses “Proficient” criteria, but there are gaps in clarity, logic, or detail</td> <td data-attr="Not Evident (0%)">Does not address critical element, or response is irrelevant</td> <td data-attr="Value">10</td> </tr> <tr> <th scope="row">Windows Server OpenVAS Report: Description</th> <td data-attr="Proficient (100%)">Provides a description of each identified vulnerability, including its risks and CVE number(s) if applicable</td> <td data-attr="Needs Improvement (55%)">Addresses “Proficient” criteria, but there are gaps in clarity, logic, or detail</td> <td data-attr="Not Evident (0%)">Does not address critical element, or response is irrelevant</td> <td data-attr="Value">10</td> </tr> <tr> <th scope="row">Windows Server OpenVAS Report: Mitigation</th> <td data-attr="Proficient (100%)">Provides mitigation techniques for each vulnerability identified</td> <td data-attr="Needs Improvement (55%)">Addresses “Proficient” criteria, but there are gaps in clarity, logic, or detail</td> <td data-attr="Not Evident (0%)">Does not address critical element, or response is irrelevant</td> <td data-attr="Value">10</td> </tr> <tr> <th scope="row">Ubuntu Server OpenVAS Report: Identification</th> <td data-attr="Proficient (100%)">Selects two vulnerabilities from the report for identification, including the CVSS number and the name of each vulnerability</td> <td data-attr="Needs Improvement (55%)">Addresses “Proficient” criteria, but there are gaps in clarity, logic, or detail</td> <td data-attr="Not Evident (0%)">Does not address critical element, or response is irrelevant</td> <td data-attr="Value">10</td> </tr> <tr> <th scope="row">Ubuntu Server OpenVAS Report: Description</th> <td data-attr="Proficient (100%)">Provides a description of each identified vulnerability, including its risks and CVE number(s) if applicable</td> <td data-attr="Needs Improvement (55%)">Addresses “Proficient” criteria, but there are gaps in clarity, logic, or detail</td> <td data-attr="Not Evident (0%)">Does not address critical element, or response is irrelevant</td> <td data-attr="Value">10</td> </tr> <tr> <th scope="row">Ubuntu Server OpenVAS Report: Mitigation</th> <td data-attr="Proficient (100%)">Provides mitigation techniques for each vulnerability identified</td> <td data-attr="Needs Improvement (55%)">Addresses “Proficient” criteria, but there are gaps in clarity, logic, or detail</td> <td data-attr="Not Evident (0%)">Does not address critical element, or response is irrelevant</td> <td data-attr="Value">10</td> </tr> <tr> <th scope="row">Articulation of Response</th> <td data-attr="Proficient (100%)">Submission has no major errors related to citations, grammar, spelling, or organization</td> <td data-attr="Needs Improvement (55%)">Submission has some errors related to citations, grammar, spelling, or organization that negatively impact readability and articulation of main ideas</td> <td data-attr="Not Evident (0%)">Submission has critical errors related to citations, grammar, spelling, or organization that prevent understanding of ideas</td> <td data-attr="Value">10</td> </tr> <!--End copy to add ROWS--> <!--Paste additional ROWS here.--> <tr><!--Update "colspan" if columns are removed. Number should equal 1 less than total number of columns.--> <td colspan="4" style="text-align: right;">Total:</td> <td>100%</td> </tr> </tbody> </table> <p></p> </div> </body></html>
Not sure if your essay will get a good grade?
WE WILL WRITE DOWN YOUR ESSAY FAST AND PROFESSIONALLY!
Topic Total Points Possible Discuss your future career field.What is your career goal?Discuss the typical job duties in your future career in Human Resources.What are the qualifications to enter the HR field, and the qualifications to obtain your ideal position as HR Specialist?What is the average salary?Why are you interested in this line of work?What…
The issues that are affecting our healthcare systems present some special challenges. Changing health care models, the issues of waste, fraud and abuse, high administrative overhead, and malpractice in the health system are issues that will impact health care cost and quality. Many of the initiatives of healthcare reform will affect reimbursement at every level…
HSC 0003, Introduction to Healthcare Health Sciences and Related Studies Medical Campus Miami Dade College Topic The purpose of this paper is for students to research, learn and write about specific elements of a health care worker’s career. Students are recommended to choose the health care worker in the field they are planning to enter….
*General Tips: -This assignment is due 7 days after your last DFC is complete. Please do not submit early or it will be given a score of 0, marked missing, and will need to be resubmitted after your last DFC so that you can include reflection from all your DFCs. ? Not sure if your…
Coursework Brief (50% of total module mark) You are required to produce an APA formatted report outlining the Attention Network Test (ANT) experiment reported by Fan et al. (2002). During the timetabled workshop and seminar sessions, you will be provided further details about the coursework, including the report structure (i.e., what is required in each…
Memorandum-Part 1 TO: Recipient Name FROM: Your Name ? Not sure if your essay will get a good grade? WE WILL WRITE DOWN YOUR ESSAYFAST AND PROFESSIONALLY! Order Now DATE: SUBJECT: Main Issues: Brady v. Maryland U.S. 83 (1963) Start text here …double-spaced; indent paragraphs; cite and reference. Main Issues: Giglio v. United States…