Analyze threat and vulnerability assessment best practices.

  

Requirements

Answer the following question(s):

1. A best practice for threat assessments within the seven domains of a typical IT infrastructure is

“Assume nothing, recognizing that things change.” What do you think “assume nothing” means in

this context?

2. A best practice for performing vulnerability assessments within the seven domains of a typical IT

infrastructure is to identify assets first. Why should you identify assets before performing

vulnerability scans?

Fully address the questions in this discussion; provide valid rationale for your choices.

Required Resources

§ Course textbook

§ Internet access

Submission Requirements

§ Format: Microsoft Word (or compatible)

§ Font: Arial, size 12, double-space

§ Citation Style: Follow your school’s preferred style guide

§ Length: 1–2 pages