What are the main elements of a VM process, tailored to Mercury USA and the transportation sector?How will you plan for and define the scope of a VM process?

Project 1 – Cybersecurity Strategy and Plan of Action

What are the main elements of a VM process, tailored to Mercury USA and the transportation sector?

How will you plan for and define the scope of a VM process?

How will you identify the assets involved?

How will you scan and assess vulnerabilities?

What is/are the industry standard scanning tools? Support your findings.

What frequency of scanning do you recommend and why?

How will you report the results of scanning and recommended countermeasures?