Business Finance Homework Help

Monitoring Activities and Automation Tools Discussion

 

There are several vulnerability scanners available to assist organizations in scanning their networks and systems to detect potential risks and vulnerabilities. Review at least three of these tools and compare and contrast their features and functions. In your opinion, would you implement any of these scanners? Explain your rationale in choosing this particular tool. Here are a few resources to assist you with this assignment.

Title: Management of Information Security

ISBN: 978-1337405713 Paperback

ISBN2: 978-137671545 eBook

Authors: Michael E. Whitman, Herbert J. Mattord

Publisher: Cengage Learning

Publication Date: 2019

Edition: 6th

Format: Textbook 

Chapter 11 discusses the need for ongoing maintenance of the information security program, defining a model for a full maintenance program. Key factors involved in monitoring the external and internal environments are explained.

Read the following from your textbook:

Chapter 11 – Security Maintenance