Required software development freelancer for vulnerability and risk assessment Assignment job
Posted at - Mar 31, 2023
Toogit Instant Connect Enabled
- Please pick an asset such as a specific software, hardware component or a network protocol and apply the NIST SP800-30 framework by going through the following steps:
a. Data collection: Creation of asset survey profile, control survey profile and threat vulnerability matrix for the asset.
b. Data analysis: Impact, control and Likelihood analysis, risk score calculation.
c. Risk classification and threat vulnerability pair ranking for the asset.
d. Report generation: Use the format described in the sixth lecture.
About the recuiterMember since Sep 6, 2017 David Daymond from Mississippi, United States