VULNERABILITY ASSESSMENT

A vulnerability assessment is the process of defining, identifying, classifying and prioritizing vulnerabilities in computer systems, applications and network infrastructures.

Vulnerability assessments also provide the organization doing the assessment with the necessary knowledge, awareness and risk backgrounds to understand and react to the threats to its environment.

A vulnerability assessment process is intended to identify threats and the risks they pose. They typically involve the use of automated testing tools, such as network security scanners, whose results are listed in a vulnerability assessment report. Because security vulnerabilities can enable hackers to access IT systems and applications, it is essential for enterprises to identify and remediate weaknesses before they can be exploited.

WHY IS IT IMPORTANT

A vulnerability assessment provides an organization with information on the security weaknesses in its environment. It also provides direction on how to assess the risks associated with those weaknesses.

TYPES OF VULNERABILITY ASSESSMENTS

Network-based scans

This type of scan can also detect vulnerable systems on wired or wireless networks.

Host-based scans
I am item content. Click edit button to change this text. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.
Wireless network scans
I am item content. Click edit button to change this text. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.
Application scans
I am item content. Click edit button to change this text. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.
Database scans
I am item content. Click edit button to change this text. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.