Question: Task; Based on the request Email from FICBANK, (pasted below) you will need to identify all available services by protocol, port, and common name or
Task; Based on the request Email from FICBANK, (pasted below) you will need to identify all available services by protocol, port, and common name or use. After that, we will identify vulnerabilities in those services and categorize them using a citable standard. Our findings will be documented in the Security Assessment Report (SAR) (pasted below). Read this page and go through the linked resources for a more in-depth understanding of vulnerability assessments, patching, and industry data to understand the narrative that you will be following for the assignment in this unit. Read FICBANK's Vulnerability Assessment Information (Pasted below) request and use the Project 1 Hands-on Exercise Instructions to perform the vulnerability assessment. Before submitting your report, check out the following resources to help you revise your own writing: Organization in Writing
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
