In this module, we have learned about scanning, enumeration, and vulnerabilities

In this module, we have learned about scanning, enumeration, and vulnerabilities

In this module, we have learned about scanning, enumeration, and vulnerabilities.
For this discussion, select one of the following cyber incidents:
The SpotifyLinks to an external site. data breach on December 9th, 2020. https://www.upguard.com/news/spotify-data-breach-2020
Any global cyber hack/incident that was well published and took place in 2019 to the current that was based on vulnerability scanning.
You are assuming the role of a SOC analyst in the data center at the organization of your choosing. Currently, it is “all systems go” and “green light” status throughout the network. Then suddenly, you get an alert of some sort indicating a vulnerability scan is taking place (you pick which type).
Considering this, respond to the following questions for your initial post:
What is the alert that is coming in and from what device(s), tool(s), or software? What is it indicating?
What actions will you take and what tools will you use to determine if the alert is real or a false alarm?
What tool(s) are you using from chapters 2 through 5 in your process?
What framework(s) are you using from chapters 2 through 5 in your process?
What data are you collecting during your initial stages, where are you recording it, and why?
***Attached are chapters 2-3 and 4-5 to complete this assignment, I am not picky at all with what process to use. The information for chapter 5 has been listed at the bottom of the chapter 4 attachement. ***