Security assessment through vulnerability scan and risk scoring

Security risks are increasingly common. In the first half of 2022, an estimated 53 million people have had their information exposed through a data breach. Well-known organizations are the primary targets for cyber-attacks due to the wide range of data they can offer. However, even typical organizat...

Full description

Saved in:
Bibliographic Details
Main Author: Reginio, Danica Mae P.
Format: text
Language:English
Published: Animo Repository 2023
Subjects:
Online Access:https://animorepository.dlsu.edu.ph/etdm_comtech/16
https://animorepository.dlsu.edu.ph/context/etdm_comtech/article/1018/viewcontent/Security_Assessment_through_Vulnerability_Scan_and_Risk_Scoring.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: De La Salle University
Language: English
id oai:animorepository.dlsu.edu.ph:etdm_comtech-1018
record_format eprints
spelling oai:animorepository.dlsu.edu.ph:etdm_comtech-10182023-06-21T05:09:21Z Security assessment through vulnerability scan and risk scoring Reginio, Danica Mae P. Security risks are increasingly common. In the first half of 2022, an estimated 53 million people have had their information exposed through a data breach. Well-known organizations are the primary targets for cyber-attacks due to the wide range of data they can offer. However, even typical organizations are at risk of ever-changing and complex cyber-attacks. Attackers take advantage of the data, whether corporate or personal. A security assessment is the starting point for an organization to establish its cybersecurity policy and combat security threats. It provides a view of the organization’s cybersecurity posture at a point in time. Conducting a regular security assessment to understand where an organization stands in its cybersecurity paths is significant. Having stringent controls can significantly help in times of an unexpected breach and protect the business's reputation. This capstone project aims to perform a security assessment through a vulnerability scan and risk scoring for an information services company to maintain its high-security posture and maturity standards. The author reviewed and differentiated automated cybersecurity risk scoring tools and adapted and performed an evaluation test for the chosen risk scoring tool. Furthermore, the author performed a vulnerability scan using Qualys as the Software as a Service (SaaS) tool and presented the cybersecurity risk scoring tool and vulnerability scan results. Keywords: Security Assessment, Vulnerability Scan, Risk Scoring tool 2023-04-01T07:00:00Z text application/pdf https://animorepository.dlsu.edu.ph/etdm_comtech/16 https://animorepository.dlsu.edu.ph/context/etdm_comtech/article/1018/viewcontent/Security_Assessment_through_Vulnerability_Scan_and_Risk_Scoring.pdf Computer Technology Master's Theses English Animo Repository Computer security Cyberterrorism Information Security
institution De La Salle University
building De La Salle University Library
continent Asia
country Philippines
Philippines
content_provider De La Salle University Library
collection DLSU Institutional Repository
language English
topic Computer security
Cyberterrorism
Information Security
spellingShingle Computer security
Cyberterrorism
Information Security
Reginio, Danica Mae P.
Security assessment through vulnerability scan and risk scoring
description Security risks are increasingly common. In the first half of 2022, an estimated 53 million people have had their information exposed through a data breach. Well-known organizations are the primary targets for cyber-attacks due to the wide range of data they can offer. However, even typical organizations are at risk of ever-changing and complex cyber-attacks. Attackers take advantage of the data, whether corporate or personal. A security assessment is the starting point for an organization to establish its cybersecurity policy and combat security threats. It provides a view of the organization’s cybersecurity posture at a point in time. Conducting a regular security assessment to understand where an organization stands in its cybersecurity paths is significant. Having stringent controls can significantly help in times of an unexpected breach and protect the business's reputation. This capstone project aims to perform a security assessment through a vulnerability scan and risk scoring for an information services company to maintain its high-security posture and maturity standards. The author reviewed and differentiated automated cybersecurity risk scoring tools and adapted and performed an evaluation test for the chosen risk scoring tool. Furthermore, the author performed a vulnerability scan using Qualys as the Software as a Service (SaaS) tool and presented the cybersecurity risk scoring tool and vulnerability scan results. Keywords: Security Assessment, Vulnerability Scan, Risk Scoring tool
format text
author Reginio, Danica Mae P.
author_facet Reginio, Danica Mae P.
author_sort Reginio, Danica Mae P.
title Security assessment through vulnerability scan and risk scoring
title_short Security assessment through vulnerability scan and risk scoring
title_full Security assessment through vulnerability scan and risk scoring
title_fullStr Security assessment through vulnerability scan and risk scoring
title_full_unstemmed Security assessment through vulnerability scan and risk scoring
title_sort security assessment through vulnerability scan and risk scoring
publisher Animo Repository
publishDate 2023
url https://animorepository.dlsu.edu.ph/etdm_comtech/16
https://animorepository.dlsu.edu.ph/context/etdm_comtech/article/1018/viewcontent/Security_Assessment_through_Vulnerability_Scan_and_Risk_Scoring.pdf
_version_ 1769841924655546368