The Rest of the resources and instructions are provided in the screenshots below. You will need the Project overview to complete this

 The Rest of the resources and instructions are provided in the screenshots below. You will need the Project overview to complete this assignment.

Project Overview

This project includes the following tasks:

  1. Gather product information
  2. Analyze and differentiate product vulnerabilities
  3. Recommendation based on empirical data collection
Objective: Product Selection Recommendation

Organizations depend on cybersecurity professionals to evaluate technologies and products. Organizations may use the analysis to make purchasing recommendations or to establish equipment and deployment standards. Product analysis is a workplace skill that is universal throughout the business community. Evaluating technologies and products helps to ensure that the workplace environment remains secure.

As stated in the NIST Special Publication 800-36, product selection involves people throughout various departments within the organization. Each person involved in the product selection process must understand the importance of security.

In evaluating various products and technologies, the organization analyzes identified threats and vulnerabilities as part of the selection process.

Common Vulnerabilities and Exposures (CVE) provides common names (also called CVE Identifiers) for publicly known cybersecurity vulnerabilities. CVE’s provide reference points so that information security products and services have a common baseline for evaluation. CVE makes it easier to share data about tools, repositories, and services.

The CVE Details website allows individuals to perform a deep analysis in comparing technologies.

When selecting products and technologies, the organization’s team needs to consider the threat environment and the security functions to lessen the risks to an acceptable level.

Website Links

NIST Guide to Selecting Information Technology Security Products

Common Vulnerabilities and Exposures

CVE Details

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

i need someone to do this homework for me  Technische Informatik 1 Wintersemester 2024/2025 Übungsblatt 9 Bitte Beachten! Diese Hausübung ist

i need someone to do this homework for me  Technische Informatik 1 Wintersemester 2024/2025 Übungsblatt 9 Bitte Beachten! Diese Hausübung ist eine Zulassungsvorraussetzung für die Klausur. Bitte laden sie ihre Lösung entsprechend der Aufgabenbeschreibung in Moodle über den dazu vorgesehenen Punkt bis zum 08.01.25 23:59Uhr auf Moodle hoch. Übung 9

Follow the attach instructions to complete this work. Analyzing a Business Function – Project Management   Must post first. Subscribe Nofsinger

Follow the attach instructions to complete this work. Analyzing a Business Function – Project Management   Must post first. Subscribe Nofsinger Consulting Services uses Project Management techniques to manage client engagements. One of the primary responsibilities of the engagement project managers is ensuring that the advisory services and associated written

Kenya Forestry College [email protected] P.O. BOX 8 -20203, Londiani Tel .No.0202349901, 07232262 APPLICATION FOR TRAINING PROGRAMMES

Kenya Forestry College [email protected] P.O. BOX 8 -20203, Londiani Tel .No.0202349901, 07232262 APPLICATION FOR TRAINING PROGRAMMES 2019/2020 Applications are invited for the following training programmes to be offered at Kenya Forestry College, Londiani commencing on the given dates. S/ n Programme Entry Requirements Duration Commencement Date Total Cost (Ksh) 1