Solved

network vulnerability forms

Posted on 2011-03-14
6
276 Views
Last Modified: 2012-05-11
I’ve been browsing the internet for template forms for reporting network vulnerabilities. I see allot of forms for network security incident response but not for vulnerabilities; the difference being a proactive reactive approach to securing your network. One could say "If you’re aware of an vulnerability then just fix it", well yea that’s true but if these problems are the result of someone else who’s not very cooperative then the problem needs to have a paper trail regardless. Does anyone know of a good template out there?
0
Comment
Question by:Roodona
  • 3
  • 3
6 Comments
 
LVL 5

Expert Comment

by:paulqna
ID: 35133388
Are you asking for a software tool that logs suspicious behaviour?

Of do you want a template to fill in similar to filing a report to, lets say for example, an insurance company? One that contains as many usefull fields that can be manually filled in as possible?
0
 

Author Comment

by:Roodona
ID: 35140872
Yea like a pdf or word document where I can fill in the issue and be able to send it as a email to someone. Not looking for a software program just a word or pdf template with blank fields.
0
 
LVL 5

Accepted Solution

by:
paulqna earned 500 total points
ID: 35140949
What about saving this url to html and then convert it to doc or pdf, removing the submit buttons etc...?
0
Do You Know the 4 Main Threat Actor Types?

Do you know the main threat actor types? Most attackers fall into one of four categories, each with their own favored tactics, techniques, and procedures.

 

Author Comment

by:Roodona
ID: 35152004
oh man, thats awsome, ty!!!
0
 

Author Closing Comment

by:Roodona
ID: 35152012
perfect exactly with I was looking for THANK YOU!!!
0
 
LVL 5

Expert Comment

by:paulqna
ID: 35152071
You're welcome.
0

Featured Post

Complete VMware vSphere® ESX(i) & Hyper-V Backup

Capture your entire system, including the host, with patented disk imaging integrated with VMware VADP / Microsoft VSS and RCT. RTOs is as low as 15 seconds with Acronis Active Restore™. You can enjoy unlimited P2V/V2V migrations from any source (even from a different hypervisor)

Join & Write a Comment

Many companies are looking to get out of the datacenter business and to services like Microsoft Azure to provide Infrastructure as a Service (IaaS) solutions for legacy client server workloads, rather than continuing to make capital investments in h…
By this time the large percentage of day-to-day transactions have shifted to mobile banking; here are some overriding areas QAs must investigate while testing mobile banking apps.  
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
This video demonstrates how to create an example email signature rule for a department in a company using CodeTwo Exchange Rules. The signature will be inserted beneath users' latest emails in conversations and will be displayed in users' Sent Items…

708 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

11 Experts available now in Live!

Get 1:1 Help Now