CS 501 IDA Computer Science Common Vulnerability Scoring System Paper
Description
- As stated in Chapter 19, A number of organizations are involved in maintaining network vulnerability resources not dissimilar from virus and malware resources (Brooks, Grow, Craig, & Short, 2018).Mr. Scott would like you to research the MITRE databases. MITRE hosts three databases that you can use as a security professional to help research vulnerabilities, Attack Patterns, and Common Weaknesses in software and hardware. Here are the databases:
- Common Vulnerabilities and Exposures (CVE) list is a publicly available list that you can search (https://cve.mitre.org/cve/search_cve_list.html (Links to an external site.)). Here is a list of software the was identified as part of the NIST Cybersecurity Framework Identify function. What can you find out about these products and what should Techworx do?
- SoftwareVersionAdobe Flash Player Desktop Runtime 32.0.0.371VideoLAN VLC media player 2.2.xSearch for a software product of your own.x.x
- For each of the other databases, find one example, and write a short summary of what you find. There is a lot of technical information in these databases. Do not get discouraged. I want to familiarize you with these tools that you can use in the future. Do some research on any terms you are unfamiliar with and include it in your report. You will never know when you will be asked to use these in the future. Discuss the CVSS.
- Common Attack Pattern Enumeration and Classification (CAPEC) https://capec.mitre.org/index.html (Links to an external site.)
- Common Weakness enumeration https://cwe.mitre.org/index.html (Links to an external site.)
- What is the CVSS (Common Vulnerability Scoring System). Share/Explain a current vulnerability and its score.
- (optional) bonus for reporting on a Google Project Zero entry.
Have a similar assignment? "Place an order for your assignment and have exceptional work written by our team of experts, guaranteeing you A results."