Vulnerabilities are ever present in systems and network devices and resources are limited.
Given the fact that not all vulnerabilities are as important as others, complete independent research outside of the text and present to your classmates how you would prioritize based on a fiscally responsible risk-based strategy, and what would be your prioritized remediation strategy for the vulnerabilities?
Please prepare an original posting early in the conference week and dialogue with at minimum three of your peers’ posts through the conference week. You must make your initial post before you are able to view the posts of your peers.
To view the discussion board rubric, click the gear icon in the upper right corner and select “Show Rubric.”