Proving due diligence and compliance.
A Vulnerability Assessment is a process of identifying and analyzing a system or network for any potential vulnerabilities, flaws or weaknesses that could leave it open to exploitation.
It is performed using:
� Full credentials supplied or limited to basic user credentials dependent on level of test. � Full access to Network diagrams and schematics. � Full access to Configuration scripts and files.
Read More.. | Comments (0) | Resources.