11 Dec Create a table comparing 10 of the vulnerabilities, threats, and risks for the real-world security incident, along with related vulnerabilities that may have contributed to the security incident.
Create a table comparing 10 of the vulnerabilities, threats, and risks for the real-world security incident, along with related vulnerabilities that may have contributed to the security incident.
Include the following as at least 3 of the comparisons used in the table.
*How was the vulnerability detected?
*What protocol was attacked?
*How were steps taken to resolve the vulnerability?
Note: The last page of your table should include a narrative with your account of the trends revealed in the table.
Include additional detail, color commentary, or insights that you might share in a discussion about the table.
Write a 1- to 2-page narrative explaining trends shown from the table.
