Question: DO NOT USE AMAZON WEB CENTER AS AN ANSWER Part 1: Vulnerability Scanning Standard Locate and read the Vulnerability Scanning Standard in the NIST Cybersecurity
DO NOT USE AMAZON WEB CENTER AS AN ANSWER
Part 1: Vulnerability Scanning Standard
Locate and read the Vulnerability Scanning Standard in the NIST Cybersecurity Framework Policy Template Guide. Research online for a real-world implementation example of the standard/policy and compare it with the NIST policy template side by side.
Answer the following questions clearly and systemically in this Word document. Make sure to include a References section toward the end of the document.
- The Vulnerability Scanning Standard is implemented for which NIST function and sub-categories? [5 points]
Answer:
- Which organization is the implementation example you identified for? Which industry sector (e.g., education, government, etc.) is the organization in? [5 points]
Answer:
- What is the purpose of the example standard/policy? Which party (parties) does the standard/policy apply to? Who is/are responsible for implementing this policy? [5 points]
Answer:
- As compared to the NIST policy template, how is the example standard/policy customized to fit the needs of the organization? Describe two occurrences of customization in detail. [10 points]
Answer:
- If specified in the example standard/policy, what criteria are defined to verify the organizations compliance to the policy? If not specified in the example standard/policy, what are your recommendations? [5 points]
Answer:
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
