Week 1 Mapping Vulnerabilities to Security Controls Testing Paper For this assignment, use the organization you chose in Week 1.
Part I: Mapping Vulnerabilities to Security Controls
Choose 5 distinct security control families as specified in NIST SP 800-53 (Rev. 4) that are most applicable to your organization’s known vulnerabilities.
Create a 1-page spreadsheet in Microsoft® Excel® that identifies the following criteria for each family:
Control ID
Control Name
Vulnerability
Recommended mitigation (refer to your Week 3 assignment; refine them for this mitigation)
Part II: Security Controls Testing
Provide a 2- to 3-page table in Microsoft Word including each family, and describe the testing procedure that will mitigate the vulnerability. Annotate whether the testing procedure is an interview, observation, technical test, or a combination.
Example of Security Controls Testing Table:
Part III: Penetration Testing and Vulnerability Scanning
Provide a 1-page description of penetration testing and vulnerability scanning processes.
Describe how they are used as part of the organization’s testing and assessment strategy.
Format your citations according to APA guidelines.
Submit your assignment.
Consider the following information, and answer the question below. China and England are international trade…
The CPA is involved in many aspects of accounting and business. Let's discuss some other…
For your initial post, share your earliest memory of a laser. Compare and contrast your…
2. The Ajax Co. just decided to save $1,500 a month for the next five…
How to make an insertion sort to sort an array of c strings using the…
Assume the following Keynesian income-expenditure two-sector model: AD = Cp + Ip Cp = Co…