9/27/14
NT2580
Michael Johnson
Unit 2 Assignment1 Calculate the Window of Vulnerability
To: Administrator and Management
I am writing you to let you know that a breach has been found after a viewing of our network. We sent a request to Microsoft Company to look at the breach in the separation of the network. This is due to the security hole that was found and used to breach our company. The reason for these holes are the type of devices that are being used by our employees. These are as follows laptops, desktops, and servers. Each of these devices have a different network card and ways they hook up to the network.
The window of vulnerability starts when you find the security breach on our system. After it is found you need to get it sent to Microsoft Company so they can make a patch to fix the breach. Then the network administrator gets the patch three days after you send in the request. Administrator then downloads and tests to make sure it works correctly. If it works correctly you install and run the patch. If you get the patch over the weekend you will want the other offices to have their computers on or off so the update is installed quickly as possible. The amount of days can vary depending on the security breach. It also depends on when the breach is found will lengthen the time or keep it short. The time of day plays a part if it is early or late allows the start time to fix it to be on the same day or the next day. The time table can be as