Discussion
Assignment: Submit one initial post addressing the topics below, and respond to two classmate’s posts.
1. What is vulnerability assessment?
2. Who is generally involved in a vulnerability assessment?
3.If you were the CISO, what would you like to see in the vulnerability assessment report?
Guidelines:
Provide one post of no less than 300 words. Cite sources when applicable.
Sources and citations should be in APA format.