Vulnerability Assessment
A vulnerability assessment is
designed to test your internal or external infrastructure against known
vulnerabilities. A vulnerability assessment will also test an infrastructure
against manufacturer known passwords and default configuration parameters. Vulnerability
Assessment is not rocket science to perform automatically. Vulnerability Assessment
scans starts after all is pretty automated from the beginning and then reports
back its findings in the form of a report and that's it.
Linux is the primary tool for
system hacking. All of the best scripts run on it, and developing new tools is
easier than in Windows. The code also tends to be more compact. Since the
network assessment process usually begins with automated or semi-automated
vulnerability scans, and progresses to attempting to exploit weaknesses found
by those scans, a product that does both, and integrates both results and
reporting. We apply human logics in the context of business risks, and the
results are more thorough and comprehensive than an automated scanning report.
A Vulnerability Analysis
provides an overview of the flaws that exist on the system. Vulnerability
Analysis is the process of identifying vulnerabilities on a network and
quantifying the security Vulnerabilities in a system. A Vulnerability Analysis
works to improve security posture and develop a more mature, integrated
security program. Commonly Vulnerability Assessment goes through the following
phases: Information Gathering, Port Scanning, Enumeration, Threat Profiling
& Risk Identification, Network Level Vulnerability Scanning, Application
Level Vulnerability Scanning, Mitigation Strategies Creation, Report
Generation, and Support.
I like your post about "Vulnerability Assessment " very nice post. It is very help full.I do appreciate about this post & this blog ... :)
ReplyDeletevulnerability assessment
penetration testing