A security vulnerability report identifies the areas of the organization which are at risk of lost data, outages, etc. Typically, organizations categorize the report to focus on specific areas of the organization and highlight the level of risk per area. Based on the vulnerability report, organizations are able to plan appropriately for budget and resource improvements.
Complete a four to six slide presentation describing the vulnerabilities and associated threats found in your data flow diagram from Week 1. Include detailed slide notes with at least one supporting reference for each slide note. No audio required.
Consider people, processes, and technology that can be exploited by the source of a threat.