Vulnerability Assessment

Vulnerability assessment are rules to follow to help identify the vulnerability of an asset or assets at risk of being lost, taken, damaged, or destroyed. As such, Vulnerability assessment can be used as a tool for managing threats, or if you prefer, managing the risk that accompanies threats. Threats come in a different way. Threat can be caused by nature, such as flooding, hurricanes, earthquakes, etc. It could also happen as a result of an accident, such as fire, breakdown of equipment, collapse of a structure, and the greatest threat is man-made threats, such as crime, sabotage, and terrorism. One of the most common uses for vulnerability assessments is their capability to validate security measures. 

There are two types of vulnerability assessments: The host and network.
Vulnerability assessment is not restricted to computer systems/networks. For example, a physical building can be assessed so it will be clear what parts of the building have what kind of flaw. If the attacker can bypass the security guard at the front door through the back door is a vulnerability known as exploit. The physical security is one of the most important aspects to be taken into account. If the attackers have physical access to the server, the server/system with all the content is taken over. Vulnerability assessment without a comprehensive report is pretty much useless. A vulnerability assessment report should include identification and quantity of vulnerabilities

Comments

Popular posts from this blog