Course Hero Logo

Vulnerability Assessment.docx - VULNERABILITY ASSESSMENT 1...

Course Hero uses AI to attempt to automatically extract content from documents to surface to you and others so you can study better, e.g., in search results, to enrich docs, and more. This preview shows page 1 - 3 out of 3 pages.

VULNERABILITY ASSESSMENT 1Vulnerability AssessmentStudents NameInstitutional AffiliationCourse Number and NameInstructorDate
VULNERABILITY ASSESSMENT 2Vulnerability AssessmentVulnerability assessment is a process that involves the identification of the risks vulnerabilities that exist in the computer networks, systems, applications, or the IT ecosystem. It should be noted that the vulnerability assessment offers a security team as well as any other stakeholders the information important to carrying out the analysis and prioritizing the risks for appropriate mitigation (Garcia, 2016). Performing vulnerability analysis helps to understand the weak areas and therefore provides an opportunity for the security personnel to fix them before it is too late. There are various salient points of vulnerability assessment. This includes risk management, which is an act of identifying as well as assessing and most importantly controlling
End of preview. Want to read all 3 pages?

Upload your study docs or become a

Course Hero member to access this document

Term
Spring
Professor
N/A
Tags

Newly uploaded documents

Show More

Newly uploaded documents

Show More

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture