The security program has been a huge success. Several of the PCS government clients have expressed their appreciation and increased confidence in the company’s ability to protect their program data and assets
. Your company is now in the continuous monitoring phase and your information security analysts are performing routine assessments on the servers and workstations.
B
ased on your research for Unit 8
:
• Describe the importance of assessments in system and application security.
• Describe some of the major challenges with this area of security and address why the job is never done.
• Review the results of the vulnerability scan provided by one of your analysts for a client’ssystem. Explain ten of the failures found on the client system and how the PCS security program prevents these problems on the corporate network.
• Conclude by discussing the relationship between assessments and the importance it has in continuous monitoring.
The requirements for your assignment are:
• 1-2-page APA paper excluding title and reference pages
• Provide at least two references and in-text citations in APA format
• College level writing
Link-to assessment report .
https://learn-us-east-1-prod-fleet02-xythos.content.blackboardcdn.com/5d48331b24326/33885166?X-Blackboard-S3-Bucket=learn-us-east-1-prod-fleet01-xythos&X-Blackboard-Expiration=1709348400000&X-Blackboard-Signature=3INvvjoQrybvQn5yGjGIamlgY9%2BWlpERGQsPd7L%2FBXc%3D&X-Blackboard-Client-Id=300560&X-Blackboard-S3-Region=us-east-1&response-cache-control=private%2C%20max-age%3D21600&response-content-disposition=inline%3B%20filename%2A%3DUTF-8%27%27Network%2520Vulnerability%2520Assessment%2520Report.pdf&response-content-type=application%2Fpdf&X-Amz-Security-Token=IQoJb3JpZ2luX2VjED4aCXVzLWVhc3QtMSJIMEYCIQDSowN1RBdedXTNO5470oJHhouhGiZF0V6HD3tx%2Bwh6%2BAIhAJMowUcFBK1dDF1eLyYGAE9TCiSDXHmgbDa56A9q7WpkKrQFCDcQAxoMNjM1NTY3OTI0MTgzIgxrx%2B1cpcoEvVc%2F6CsqkQXzvSEYMpe7W5tE4JjaZJP9jry1zjs6r0%2FPFfteDC2Sra4%2Bfydr4wDH7z6Xxf85wf0luHC5C%2B21pzFPUh6jzX5GXb3zq99LPsnqtyaA8BZc8MCY5CU8wua%2FnSUN9PqJh7l%2BNsRZrilMvN3iDntNZVhjdXl0RvN1IDufxWYbcL%2BRY2oY8Ccnt%2F9xXaW26T6CcoIMMCjWmLN5zaE4lYDDoUBkMoboaH7qVz50RP5eXq9OYEEX0W2fr9zKTp6L7SYQH0dMlB8wH3A%2B2KadWGfZg6%2FEVZiPZ2Ojdj6fCZFwtAoACZcKm51E9Hr3N7ES2pm3Zl6uzFtCQgGYFyBxQ1kNv43Hvp4cQ5yqJnX0EY4t%2FiC8K20DFN1KBPEtGaZdWSTgly%2Fc63v0pZHzyp3N%2FS8uPrHjrn5Iu8DoESnUNDD7%2FaRmNzc5BurWpTFd99HKyDQLGMxgD0l%2BIV8xKZ1vRZTqc%2F4%2FIZXCqIl4CQ2YYOAvleeh%2FPp%2Fg2vzgAnKqfd3VAtpv%2FyhXBgmcsE9wiqpZFGMvBGlbAHa4AlQkG6L7RbIACiuoMYRFLFajxgGaIBm6GXOnMfmiImnOjDPqyPvr4H46iDRq8LwC5Z8cHMv%2FTpPwhjf86YIWP%2FkfSzDsbRKkuNu8xDz88FJCdrn9DGYqt65A3gAHqNlkahGvYigYYdyrC0lDMctJLAoO%2Bgk0%2BtiQhepMpZNrOahrFw%2FalstTYOjZ7pJAZmxqh%2FuUREiZno5CIsxLUgPJobV3jCvH8d%2Bf2xDKSP82JqfAenNfWGjyvLRT9jhUHuSBrVdmB7PW7FmEZ1QJg3e63xM3yTPp4qd6rJSBio42lsT1YYAtYqcTMgT0uPYqiEyaaRqryvrKXf9ShYb2OEw45OJrwY6sAGp6rnM%2Ffj8ie6gHmwLd7bVZcz7QWhmzgaCIz64xbmayjzqyFOLulUrEkTYdyLZK7pe6Ry4ILgjDvXVFt1A6hAIkr%2FFOSQAEaZZfxz9vItzbOZuAa7b%2B2CrZdNtCkSjkwz15Z0fVnxH%2BaEISV%2FhAeFSUe136e75Tsf863y6kYrewhtCSCDe61gf6N1tJEwI1RreN3w3rMx3qrBFkYMoTKlzfQ7cZHiNtjGEhFA%2BetFp8g%3D%3D&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Date=20240301T210000Z&X-Amz-SignedHeaders=host&X-Amz-Expires=21600&X-Amz-Credential=ASIAZH6WM4PL3QSK6INA%2F20240301%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Signature=2687f4f0bfa2a9a1040859701c798f9ba6ab9d86a60b97daa951220a93594032