Requirements
Answer the following question(s):
1. A best practice for threat assessments within the seven domains of a typical IT infrastructure is
“Assume nothing, recognizing that things change.” What do you think “assume nothing” means in
this context?
2. A best practice for performing vulnerability assessments within the seven domains of a typical IT
infrastructure is to identify assets first. Why should you identify assets before performing
vulnerability scans?
Fully address the questions in this discussion; provide valid rationale for your choices.
Required Resources
§ Course textbook
§ Internet access
Submission Requirements
§ Format: Microsoft Word (or compatible)
§ Font: Arial, size 12, double-space
§ Citation Style: Follow your school’s preferred style guide
§ Length: 1–2 pages