0% found this document useful (0 votes)
153 views

Abstract of Vulnerability Assessment

Vulnerability assessment aims to identify weaknesses and vulnerabilities in systems that could be exploited to violate security policies. It assesses risks to improve security awareness and sets guidelines to close risks and reinforce processes. A network vulnerability assessment identifies weaknesses and vulnerabilities visible on the network to determine exploitable issues. It describes a complete methodology for network-based vulnerability assessments.
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
153 views

Abstract of Vulnerability Assessment

Vulnerability assessment aims to identify weaknesses and vulnerabilities in systems that could be exploited to violate security policies. It assesses risks to improve security awareness and sets guidelines to close risks and reinforce processes. A network vulnerability assessment identifies weaknesses and vulnerabilities visible on the network to determine exploitable issues. It describes a complete methodology for network-based vulnerability assessments.
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 1

Abstract

Vulnerability assessment aims at identifying weaknesses and


vulnerabilities in a system's design, implementation, or
operation and management, which could be exploited to violate
the system's security policy. The overall scope of vulnerability
assessment is to improve information and system security
awareness by assessing the risks associated. Vulnerability
assessment will set the guidelines to close or mitigate any risk
and reinforce security processes. Furthermore it will form an
auditable record of the actions performed in protecting from the
most current vulnerabilities.

The purpose of a network-based vulnerability


assessment is to identify the weaknesses and vulnerabilities
visible and exploitable on the network.
This presentation describes a complete methodology of
network-based vulnerability assessment

You might also like