1: In the Unit 2 Individual Project, you were tasked to identify 4 vulnerabilities for various
assets. Using all of these for each group member, consolidate the list of vulnerabilities and assets into a
Discussion Board, and discuss the reality of an exploit of each the vulnerabilities. Rank the top 6 most
vulnerable assets.
Group Discussion #2: Review the 3 controls/policies for each group member from the Unit 4 Discussion Board,
and pick 3 that you will use in your group submission, one from each of the areas (user, acceptable use, and
database access). Explain in the Discussion Board area why each was chosen.
Group Discussion #3: Describe valid safeguards that could be implemented to address the findings from the
audit in Group Discussion #2.
Group Submission: Simulate an audit of the information systems. Describe how the team would approach an
audit of the 6 assets from Group Discussion #1 against the controls from Group Discussion #2, and then list
the safeguards from Group Discussion #3 to help resolve the findings.
Individual Portion:
Create an audit report showing the results from the audit in an acceptable format.