Network Vulnerability Assessment Sample Report 161
recommendations are ranked in order of their critical importance. This section
concludes with a summative table listing all recommendations in order of
importance (risk levels).
Final Comments
See Exhibit 7 for a sample of Final Comments.
Summary Table of Risk, Vulnerabilities, and Recommendations
See Exhibit 8 for a sample Summary Table of Risk, Vulnerabilities, and
Recommendations.
Glossary
See Exhibit 9 for a sample Glossary.
Summary
When developing your findings and recommendations, stick to the facts. Try
not to let your opinions and those of the team color the findings. It is important
to stay as neutral as possible. Listen to the people in the interviews and get
their concerns and opinions. Do not go ...