Security assessment through vulnerability scan and risk scoring

Security risks are increasingly common. In the first half of 2022, an estimated 53 million people have had their information exposed through a data breach. Well-known organizations are the primary targets for cyber-attacks due to the wide range of data they can offer. However, even typical organizat...

Full description

Saved in:
Bibliographic Details
Main Author: Reginio, Danica Mae P.
Format: text
Language:English
Published: Animo Repository 2023
Subjects:
Online Access:https://animorepository.dlsu.edu.ph/etdm_comtech/16
https://animorepository.dlsu.edu.ph/context/etdm_comtech/article/1018/viewcontent/Security_Assessment_through_Vulnerability_Scan_and_Risk_Scoring.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: De La Salle University
Language: English
Description
Summary:Security risks are increasingly common. In the first half of 2022, an estimated 53 million people have had their information exposed through a data breach. Well-known organizations are the primary targets for cyber-attacks due to the wide range of data they can offer. However, even typical organizations are at risk of ever-changing and complex cyber-attacks. Attackers take advantage of the data, whether corporate or personal. A security assessment is the starting point for an organization to establish its cybersecurity policy and combat security threats. It provides a view of the organization’s cybersecurity posture at a point in time. Conducting a regular security assessment to understand where an organization stands in its cybersecurity paths is significant. Having stringent controls can significantly help in times of an unexpected breach and protect the business's reputation. This capstone project aims to perform a security assessment through a vulnerability scan and risk scoring for an information services company to maintain its high-security posture and maturity standards. The author reviewed and differentiated automated cybersecurity risk scoring tools and adapted and performed an evaluation test for the chosen risk scoring tool. Furthermore, the author performed a vulnerability scan using Qualys as the Software as a Service (SaaS) tool and presented the cybersecurity risk scoring tool and vulnerability scan results. Keywords: Security Assessment, Vulnerability Scan, Risk Scoring tool