0% found this document useful (0 votes)
1K views23 pages

Vulnerability Assessment Report

The document discusses vulnerability assessment and provides examples of vulnerabilities that can be assessed. It defines vulnerability assessment as identifying, quantifying, and prioritizi…
0% found this document useful (0 votes)
1K views23 pages

Vulnerability Assessment Report

The document discusses vulnerability assessment and provides examples of vulnerabilities that can be assessed. It defines vulnerability assessment as identifying, quantifying, and prioritizing vulnerabilities in a system. Both host-based and network-based vulnerability assessments are needed to find vulnerabilities that can be exploited from inside or outside the security perimeter. Examples of vulnerabilities discussed include those in operating systems, antivirus software, firewalls, browsers, applications, and Linux kernel vulnerabilities.

0% found this document useful (0 votes)
1K views23 pages

Vulnerability Assessment Report

The document discusses vulnerability assessment and provides examples of vulnerabilities that can be assessed. It defines vulnerability assessment as identifying, quantifying, and prioritizi…
You are on page 1
23
576648e32a3d8b82ca71961b7a986505