BSIT380-T302 Week 3 Blog

The readings from this week demonstrate that vulnerability management requires more than scanning activities because it demands an organizational strategy to detect and evaluate risks according to specific business requirements. 

Chapter 5 demonstrated that maintaining an accurate and up-to-date asset inventory stands as a fundamental requirement for organizations. The protection of assets becomes impossible without knowing what assets exist. The continuous execution of vulnerability scanning together with strong patch management practices stood out to me as the most important aspect. The chapter demonstrated that unfiltered scan results lack accuracy, so analysts need both technical and critical thinking abilities to distinguish between actual threats and false positives.

Chapter 7 talked about incident response and forensic readiness as essential components. The main lesson I learned was that vulnerability scanning exists to help organizations prepare for potential security incidents that might occur. Teams can minimize damage by collecting appropriate logs and understanding vulnerability impacts within specific contexts. The chapters established a clear connection between proactive scanning activities and actual incident response readiness.

Comments

Popular posts from this blog

BSIT380-T302 Week 2 Blog

BSIT380-T302 Week 1 Blog

BSIT 220-T301 Week 7 Blog