Activity 13.2: Context Awareness Evaluation
In this exercise, you will evaluate a series of scenarios to determine the context of identified vulnerabilities—whether they exist in internal, external, or isolated environments. Using these classifications, you will assess the associated risks and justify your prioritization decisions. This process will enhance your understanding of how different environmental factors affect vulnerability prioritization.
Instructions
You will be presented with four scenarios. You will evaluate them for their context: internal, external, isolated, or more than one type. Using the provided risk rating and your determinations, you will then assign vulnerability prioritization using Table 13.2. During your evaluation, define a justification for all your choices.
Scenario 1: Outdated Database Service
A vulnerability is discovered in an outdated database service used internally for data analytics. The system is behind a firewall, accessible...