A vulnerability
assessment is a process that defines, identifies, classifies and
prioritizes weaknesses in a computer system, software application or network
infrastructure. The goal of the assessment is to understand potential threats
and react appropriately.
Vulnerability
assessments typically involve the use of automated testing tools that conduct
scans. Types of scans include:
Vulnerability assessments vs. penetration
tests
A vulnerability
assessment aims to uncover weaknesses in a network and recommend the
appropriate mitigation or remediation to reduce or remove the risks. Although
sometimes carried out in concert with vulnerability assessments, the primary aim
of pen tests is to check whether a vulnerability really exists and prove that
exploiting it can damage the application or network.
A vulnerability
assessment often includes a penetration testing component to identify
vulnerabilities in an organization's personnel, procedures or processes that
might not be detectable with network or system scans. The process is sometimes
referred to as vulnerability assessment/penetration testing, or VAPT. While a
vulnerability assessment is usually automated, penetration testing generally
combines automated and manual techniques.
Comments
Post a Comment