Required software development freelancer for vulnerability and risk assessment Assignment job
Posted at - Jul 28, 2024
Toogit Instant Connect Enabled
- Please pick an asset such as a specific software, hardware component or a network protocol and apply the NIST SP800-30 framework by going through the following steps:
a. Data collection: Creation of asset survey profile, control survey profile and threat vulnerability matrix for the asset.
b. Data analysis: Impact, control and Likelihood analysis, risk score calculation.
c. Risk classification and threat vulnerability pair ranking for the asset.
d. Report generation: Use the format described in the sixth lecture.
About the recuiterMember since May 20, 2018 Patrick Brassar from Margibi, Liberia