Could someone complete an analysis of a vulnerability scan

Your task will be to review, analyze, and report on a log file generated by an automated sample vulnerability scan. Parse a sample vulnerability log and complete the following tasks. A sample file will be moved to Doc Sharing that contains information from a real vulnerability scan. (Note: It is large; about 20MB in size)

Step 1

Evaluate it, summarizing:

  • The total number of vulnerabilities found by the scan
  • The total number of unique vulnerabilities found that were critical in nature (i.e., greater than or equal to a CVSS score of 7.0)
  • The total number of machines affected with critical vulnerabilities

Step 2

Select four different specific critical vulnerabilities. Research each of them and write a 1-page summary of each that includes the following details:

  • Describe the vulnerability
  • When it was discovered
  • What the potential impact of the vulnerability is
  • Research methods to fix, correct, prevent, or mitigate the vulnerability.

Step 3

Describe your strategy to remedy these logged vulnerabilities if you owned the site described by the logs.

Please limit your paper to 10 pages.

(Note: There are many sources on the Internet that will reveal this information, from blogs and forums, technical resources, as well as sites such as,, so on. Documentation on most vulnerabilities can usually be found by simply searching for the vulnerability name on any browser and perusing the search results.)

Do you need a similar assignment done for you from scratch? We have qualified writers to help you. We assure you an A+ quality paper that is free from plagiarism. Order now for an Amazing Discount!
Use Discount Code "Newclient" for a 15% Discount!

NB: We do not resell papers. Upon ordering, we do an original paper exclusively for you.