As said in Chapter 19, “A lot of Organizations are concerned in sustaining community vulnerability assets not dissimilar from virus and malware assets” (Brooks, Develop, Craig, & Brief, 2018).
Mr Scott would really like you to analysis the MITRE databases. MITRE hosts three databases that you should use as a safety skilled to Help analysis vulnerabilities, Assault Patterns, and Frequent Weak spot in software program and hardware. Listed here are the databases:
Frequent Vulnerabilities and Exposures (CVE) checklist is a publicly accessible checklist which you can search (https://cve.mitre.org/cve/search_cve_list.html (Hyperlinks to an exterior web site.)).
Frequent Assault Sample Enumeration and Classification (CAPEC) https://capec.mitre.org/index.html (Hyperlinks to an exterior web site.)
Frequent Weak spot enumeration https://cwe.mitre.org/index.html (Hyperlinks to an exterior web site.)
For every of the databases, discover two or three examples and write a brief abstract of what you discover. There may be a whole lot of technical info in these databases. Don’t get discouraged. I need to familiarize you with these instruments that you should use sooner or later. Perform some research on any phrases you’re unfamiliar with and embody it in your report. You’ll by no means know when you may be requested to make use of these sooner or later.