Breaking News

What is vulnerability assessments

 vulnerability assessment is a systematic review of security problems in an information system.

The vulnerability assessment process helps to reduce the chances an attacker is able to breach an organization's IT systems – yielding a better understanding of assets, their vulnerabilities, and the overall risk to an organization

 It evaluates if the system is susceptible to any known vulnerabilities, assigns severity levels to those vulnerabilities, and recommends remediation or mitigation, if and whenever needed.

Following way to Perform a vulnerability assessment

  1. Step 1: Conduct Risk Identification And Analysis. ...
  2. Step 2: Vulnerability Scanning Policies and Procedures. ...
  3. Step 3: Identify The Types Of Vulnerability Scans. ...
  4. Step 4: Configure The Scan. ...
  5. Step 5: Perform The Scan. ...
  6. Step 6: Evaluate And Consider Possible Risks. ...
  7. Step 7: Interpret The Scan Results

What are the types of vulnerability assessments?

Depending on the areas of the infrastructure under review a vulnerability assessment can be classified into broad types below.

  • External Scans. ...
  • Internal Scans. ...
  • Environmental Scans. ...
  • Web Application Scanning. ...
  • Network Scanning. ...
  • Build Assessment. ...
  • Database Assessments. ...
  • Host-based Scanning.


launch your first vulnerability scan
  1. Step 1: Add IP Addresses to Scan. Go to Assets > Host Assets to see the IP addresses available to you. ...
  2. Step 2: Scanner Appliances. Scanner appliances are used to perform internal scanning. ...
  3. Step 3: Scan Option Profiles. You'll need an option profile at scan time. ...
  4. Step 4: Start Your Scan. ...
  5. Step 5: View Scan Status and Results
The 4 Types of Vulnerabilities Found in Great Men
  • Physical Vulnerability. ...
  • Economic Vulnerability. ...
  • Social Vulnerability. ...
  • Emotional Vulnerability.


White-box penetration testing provides a comprehensive assessment of both internal and external vulnerabilities, making it the best choice for calculation testing

No comments