Logo

Everyday is great to be alive!

Contact Me

  • info@mikereams.com
  • Ohio, United States

Subscribe

Subscribe to my newsletter to get the latest updates.

Cyber Security and Vulnerability Implementation

Details

4/30/2019

Cyber Security and Vulnerability Implementation

Involved evaluating and implementing best practices to protect a business from internal and external threats.

Delivered the governance process framework for certification of application access and introduced transformation standards. The activities included evaluating and implementing security best practices to protect a healtcare client from internal and external threats.

The goal was to discover any flaw or weakness in system security procedures, design, implementation, or internal controls that could be exercised (accidentally triggered or intentionally exploited) and result in a security breach or a violation of the system's security policy.

4 Steps of the Vulnerability Management Process

  1. Perform Vulnerability Scan.
  2. Assess Vulnerability Risk.
  3. Prioritize & Address Vulnerabilities.
  4. Continuous Vulnerability Management.

OWASP Top Vulnerabilities:

  1. Broken Access Control.
  2. Cryptographic Failures.
  3. Injection.
  4. Insecure Design.
  5. Security Misconfiguration.
  6. Vulnerable and Outdated Components.
  7. Identification and Authentication Failures.
  8. Software and Data Integrity Failures.

PROJECT INFORMATION

Year:

2019

Client:

Quadax Inc.

Date:

Duration:

45 Days

Complexity:

40 out of 100