Project 1: vulnerability and threat assessment step 12: write

You have reached the final step. Use the Final Vulnerability and Threat Assessment Report template in preparing the final report. In APA style, write an overview and compile all the sections prepared throughout the project into a report according to the template.

Since this report will be delivered to Maria and other top executives, tailor your writing to the appropriate audience. Be sure that coherent paragraphs or points are developed so that each is internally unified, functioning as part of the whole document.

Final Vulnerability Assessment Report

Maria Sosa is depending on you, the chief information security officer at your organization, to provide her and other executive-level stockholders with a final vulnerability assessment report. This thorough report should be presented with your findings and recommendations.

Final Vulnerability Assessment Report (seven- to 10-page report using this template: Assignment 7, Steps 11 and 12) This report should include the following components:

  • Title Page
    • Include:
      • for whom you are preparing the document, the title, the date prepared, and your name as the preparer of the document
  • Table of Contents
  • Overview (introduction and purpose)
    • Include mission-critical aspects of current organizational processes:
      • personnel
      • physical security
      • network security
      • cybersecurity
  • Scope of Work (one-page report: Assignment 1, Steps 1 and 2)
    • Include identified security threats, risks, and vulnerabilities within the organization from the preliminary classification of mission-critical aspects
  • Work Breakdown Structure (spreadsheet: Assignment 2, Step 3)
    • Include key elements that need to be tested and analyzed:
      • internal threats
      • external threats
      • existing security measures
      • compliance requirements
  • Threats and Vulnerabilities Report (two- to three-page report: Assignment 3, Steps 4-6)
    • Include:
      • explanation of threats and vulnerabilities
      • classifications of threats and vulnerabilities
      • prioritizations of threats and vulnerabilities 
  • Lessons Learned Report (two- to three-page report: Assignment 6, Steps 9 and 10)
    • Include:
      • reviewed and recorded findings
      • consider the report’s approach including:
        • factors
        • assessment completion
        • next steps
        • other issues to address
  • Network Analysis Tools Report (one- to two-page report: Assignment 4, Step 7–include as Appendix A)
    • Include comprehensive recommendations of all components within each key element that should be tested and analyzed:
      • internal threats
      • external threats
      • existing security measures
      • compliance requirements
  • Vulnerability Assessment Matrix (one-page matrix using template: Assignment 5, Step 8–include as Appendix B)
    • Assess vulnerabilities of your organization


Before you submit your assignment, review the competencies below, which your instructor will use to evaluate your work. A good practice would be to use each competency as a self-check to confirm you have incorporated all of them. To view the complete grading rubric, click My Tools, select Assignments from the drop-down menu, and then click the project title.

  • 1.2: Develop coherent paragraphs or points so that each is internally unified and so that each functions as part of the whole document or presentation.
  • 1.5: Use sentence structure appropriate to the task, message and audience.
  • 9.2: Vulnerability Assessment: Rank the vulnerabilities of a system from a disaster-management perspective.
Calculate your essay price
(550 words)

Approximate price: $22

How it Works


It only takes a couple of minutes to fill in your details, select the type of paper you need (essay, term paper, etc.), give us all necessary information regarding your assignment.


Once we receive your request, one of our customer support representatives will contact you within 24 hours with more specific information about how much it'll cost for this particular project.


After receiving payment confirmation via PayPal or credit card – we begin working on your detailed outline, which is based on the requirements given by yourself upon ordering.


Once approved, your order is complete and will be emailed directly to the email address provided before payment was made!