What is vulnerability assessments
A vulnerability assessment is a systematic review of security problems in an information system.
The vulnerability assessment process helps to reduce the chances an attacker is able to breach an organization's IT systems – yielding a better understanding of assets, their vulnerabilities, and the overall risk to an organization
It evaluates if the system is susceptible to any known vulnerabilities, assigns severity levels to those vulnerabilities, and recommends remediation or mitigation, if and whenever needed.
Following way to Perform a vulnerability assessment
- Step 1: Conduct Risk Identification And Analysis. ...
- Step 2: Vulnerability Scanning Policies and Procedures. ...
- Step 3: Identify The Types Of Vulnerability Scans. ...
- Step 4: Configure The Scan. ...
- Step 5: Perform The Scan. ...
- Step 6: Evaluate And Consider Possible Risks. ...
- Step 7: Interpret The Scan Results
What are the types of vulnerability assessments?
Depending on the areas of the infrastructure under review a vulnerability assessment can be classified into broad types below.
- External Scans. ...
- Internal Scans. ...
- Environmental Scans. ...
- Web Application Scanning. ...
- Network Scanning. ...
- Build Assessment. ...
- Database Assessments. ...
- Host-based Scanning.
- Step 1: Add IP Addresses to Scan. Go to Assets > Host Assets to see the IP addresses available to you. ...
- Step 2: Scanner Appliances. Scanner appliances are used to perform internal scanning. ...
- Step 3: Scan Option Profiles. You'll need an option profile at scan time. ...
- Step 4: Start Your Scan. ...
- Step 5: View Scan Status and Results
- Physical Vulnerability. ...
- Economic Vulnerability. ...
- Social Vulnerability. ...
- Emotional Vulnerability.
No comments
Post a Comment