1. Review the following National Vulnerability Database page on Vulnerabilities: https://nvd.nist.gov/vulnLinks to an external site.
2. Read about common vulnerabilities: Click hereLinks to an external site.
Mr. Scott would like you to research the MITRE databases. MITRE hosts three databases that you can use as a security professional to help research vulnerabilities, Attack Patterns, and Common Weaknesses in software and hardware. Here are the databases: 3. The Common Vulnerabilities and Exposures (CVE) list is a publicly available list that you can search (https://cve.mitre.org/cve/search_cve_list.htmlLinks to an external site.). Here is a list of software that was identified as part of the NIST Cybersecurity Framework Identify function. What can you find out about these products and what should Techworx do?
The NIST Cybersecurity Framework Identify function is a set of activities that organizations can use to identify and assess their cybersecurity risks. The function includes the following activities:
The software that was identified as part of the NIST Cybersecurity Framework Identify function includes:
Techworx should use the MITRE databases to research the vulnerabilities and weaknesses in the software that they use. They should also use the NIST Cybersecurity Framework Identify function to identify and assess their cybersecurity risks. By taking these steps, Techworx can improve their cybersecurity posture and protect themselves from cyberattacks.