In this activity, I conducted a vulnerability assessment for a small business. Let's consider a scenario of an e-commerce company that stores information on a remote database server since many of the employees work remotely from locations all around the world. Employees of the company regularly query, or request, data from the server to find potential customers. The database has been open to the public since the company's launch three years ago. As a cybersecurity professional, I recognized that keeping the database server open to the public is a serious vulnerability.
A vulnerability assessment of the situation can help me communicate the potential risks with the senior management of the company. Please find below my vulnerability assessment report.