Vulnerability Assessment Report
The document discusses vulnerability assessment and provides examples of vulnerabilities that can be assessed. It defines vulnerability assessment as identifying, quantifying, and prioritizing vulnerabilities in a system. Both host-based and network-based vulnerability assessments are needed to find vulnerabilities that can be exploited from inside or outside the security perimeter. Examples of vulnerabilities discussed include those in operating systems, antivirus software, firewalls, browsers, applications, and Linux kernel vulnerabilities.
Vulnerability Assessment Report