Business Finance Homework Help
Monitoring Activities and Automation Tools Discussion
There are several vulnerability scanners available to assist organizations in scanning their networks and systems to detect potential risks and vulnerabilities. Review at least three of these tools and compare and contrast their features and functions. In your opinion, would you implement any of these scanners? Explain your rationale in choosing this particular tool. Here are a few resources to assist you with this assignment.
- 8 of the Best Network Vulnerability Scanners Tested (Comparitech) (Links to an external site.)
- 6 Free Network Vulnerability Scanners (Network World) (Links to an external site.)
- Best Vulnerability Scanner Software (G2 Crowd)
Title: Management of Information Security
ISBN: 978-1337405713 Paperback
ISBN2: 978-137671545 eBook
Authors: Michael E. Whitman, Herbert J. Mattord
Publisher: Cengage Learning
Publication Date: 2019
Edition: 6th
Format: Textbook
Chapter 11 discusses the need for ongoing maintenance of the information security program, defining a model for a full maintenance program. Key factors involved in monitoring the external and internal environments are explained.
Read the following from your textbook:
Chapter 11 – Security Maintenance