Question: DO NOT USE AMAZON WEB CENTER AS AN ANSWER Part 1: Vulnerability Scanning Standard Locate and read the Vulnerability Scanning Standard in the NIST Cybersecurity

DO NOT USE AMAZON WEB CENTER AS AN ANSWER

Part 1: Vulnerability Scanning Standard

Locate and read the Vulnerability Scanning Standard in the NIST Cybersecurity Framework Policy Template Guide. Research online for a real-world implementation example of the standard/policy and compare it with the NIST policy template side by side.

Answer the following questions clearly and systemically in this Word document. Make sure to include a References section toward the end of the document.

  1. The Vulnerability Scanning Standard is implemented for which NIST function and sub-categories? [5 points]

Answer:

  1. Which organization is the implementation example you identified for? Which industry sector (e.g., education, government, etc.) is the organization in? [5 points]

Answer:

  1. What is the purpose of the example standard/policy? Which party (parties) does the standard/policy apply to? Who is/are responsible for implementing this policy? [5 points]

Answer:

  1. As compared to the NIST policy template, how is the example standard/policy customized to fit the needs of the organization? Describe two occurrences of customization in detail. [10 points]

Answer:

  1. If specified in the example standard/policy, what criteria are defined to verify the organizations compliance to the policy? If not specified in the example standard/policy, what are your recommendations? [5 points]

Answer:

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related General Management Questions!