Security assessment through vulnerability scan and risk scoring
Security risks are increasingly common. In the first half of 2022, an estimated 53 million people have had their information exposed through a data breach. Well-known organizations are the primary targets for cyber-attacks due to the wide range of data they can offer. However, even typical organizat...
Saved in:
Main Author: | |
---|---|
Format: | text |
Language: | English |
Published: |
Animo Repository
2023
|
Subjects: | |
Online Access: | https://animorepository.dlsu.edu.ph/etdm_comtech/16 https://animorepository.dlsu.edu.ph/context/etdm_comtech/article/1018/viewcontent/Security_Assessment_through_Vulnerability_Scan_and_Risk_Scoring.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | De La Salle University |
Language: | English |
id |
oai:animorepository.dlsu.edu.ph:etdm_comtech-1018 |
---|---|
record_format |
eprints |
spelling |
oai:animorepository.dlsu.edu.ph:etdm_comtech-10182023-06-21T05:09:21Z Security assessment through vulnerability scan and risk scoring Reginio, Danica Mae P. Security risks are increasingly common. In the first half of 2022, an estimated 53 million people have had their information exposed through a data breach. Well-known organizations are the primary targets for cyber-attacks due to the wide range of data they can offer. However, even typical organizations are at risk of ever-changing and complex cyber-attacks. Attackers take advantage of the data, whether corporate or personal. A security assessment is the starting point for an organization to establish its cybersecurity policy and combat security threats. It provides a view of the organization’s cybersecurity posture at a point in time. Conducting a regular security assessment to understand where an organization stands in its cybersecurity paths is significant. Having stringent controls can significantly help in times of an unexpected breach and protect the business's reputation. This capstone project aims to perform a security assessment through a vulnerability scan and risk scoring for an information services company to maintain its high-security posture and maturity standards. The author reviewed and differentiated automated cybersecurity risk scoring tools and adapted and performed an evaluation test for the chosen risk scoring tool. Furthermore, the author performed a vulnerability scan using Qualys as the Software as a Service (SaaS) tool and presented the cybersecurity risk scoring tool and vulnerability scan results. Keywords: Security Assessment, Vulnerability Scan, Risk Scoring tool 2023-04-01T07:00:00Z text application/pdf https://animorepository.dlsu.edu.ph/etdm_comtech/16 https://animorepository.dlsu.edu.ph/context/etdm_comtech/article/1018/viewcontent/Security_Assessment_through_Vulnerability_Scan_and_Risk_Scoring.pdf Computer Technology Master's Theses English Animo Repository Computer security Cyberterrorism Information Security |
institution |
De La Salle University |
building |
De La Salle University Library |
continent |
Asia |
country |
Philippines Philippines |
content_provider |
De La Salle University Library |
collection |
DLSU Institutional Repository |
language |
English |
topic |
Computer security Cyberterrorism Information Security |
spellingShingle |
Computer security Cyberterrorism Information Security Reginio, Danica Mae P. Security assessment through vulnerability scan and risk scoring |
description |
Security risks are increasingly common. In the first half of 2022, an estimated 53 million people have had their information exposed through a data breach. Well-known organizations are the primary targets for cyber-attacks due to the wide range of data they can offer. However, even typical organizations are at risk of ever-changing and complex cyber-attacks. Attackers take advantage of the data, whether corporate or personal. A security assessment is the starting point for an organization to establish its cybersecurity policy and combat security threats. It provides a view of the organization’s cybersecurity posture at a point in time. Conducting a regular security assessment to understand where an organization stands in its cybersecurity paths is significant. Having stringent controls can significantly help in times of an unexpected breach and protect the business's reputation. This capstone project aims to perform a security assessment through a vulnerability scan and risk scoring for an information services company to maintain its high-security posture and maturity standards. The author reviewed and differentiated automated cybersecurity risk scoring tools and adapted and performed an evaluation test for the chosen risk scoring tool. Furthermore, the author performed a vulnerability scan using Qualys as the Software as a Service (SaaS) tool and presented the cybersecurity risk scoring tool and vulnerability scan results.
Keywords: Security Assessment, Vulnerability Scan, Risk Scoring tool |
format |
text |
author |
Reginio, Danica Mae P. |
author_facet |
Reginio, Danica Mae P. |
author_sort |
Reginio, Danica Mae P. |
title |
Security assessment through vulnerability scan and risk scoring |
title_short |
Security assessment through vulnerability scan and risk scoring |
title_full |
Security assessment through vulnerability scan and risk scoring |
title_fullStr |
Security assessment through vulnerability scan and risk scoring |
title_full_unstemmed |
Security assessment through vulnerability scan and risk scoring |
title_sort |
security assessment through vulnerability scan and risk scoring |
publisher |
Animo Repository |
publishDate |
2023 |
url |
https://animorepository.dlsu.edu.ph/etdm_comtech/16 https://animorepository.dlsu.edu.ph/context/etdm_comtech/article/1018/viewcontent/Security_Assessment_through_Vulnerability_Scan_and_Risk_Scoring.pdf |
_version_ |
1769841924655546368 |