logo

VULNERABILITY ASSESSMENT VULNERABILITY ASSESSMENT Name of the

   

Added on  2023-04-20

4 Pages485 Words240 Views
Running head: VULNERABILITY ASSESSMENT
VULNERABILITY ASSESSMENT
Name of the Student:
Name of the University:
Author Note:

1VULNERABILITY ASSESSMENT
Vulnerability assessment in the system:
Vulnerability assessment in the system defines the process of identifying and giving
priority of the vulnerability in the system. The assessment of the vulnerability includes
assessment of the information technology, supply of the energy, transportation and the
communication system in the system. The assessment can be done on different organization
type and size (Fang et al., 2018). Vulnerability assessment is almost similar to the assessment
of the risks assessment.
The main objective of the vulnerability assessment is to identify the security
loopholes in the system before someone can exploit the loopholes. One of the techniques for
the assessment of the vulnerabilities is to develop the intrusion detection system to determine
how the technique works.
The assessment of the vulnerability is dependent between the comparisons of different
solutions, however, the focus is given on a single output. The output is the report that
identifies all the vulnerabilities present in the system.
Steps for conducting the assessment:
There are different vulnerability assessments. However the general steps for the
vulnerability assessment is mentioned below;
1. Initial assessment: In this stage the identification of the assets and risks present in the
system are evaluated. The identification of the risks along with the analysis and the
business impact analysis are done in this stage.
2. Definition of the system baseline: In this stage the gathering of the information
regarding the system is done so that the vulnerability assessment can be done in a
proper way.

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Network Security Assessment: Part 1 - Vulnerabilities Assessment
|9
|1577
|381

Network Security Assessment: Part 1 - Vulnerabilities Assessment
|9
|1749
|483

Cyber Security Program Maintenance: Executive Level Support
|5
|718
|491

Risk and Vulnerability Management in the Organization
|11
|885
|480

Network Security & Its Vulnerabilities | Document
|9
|1749
|130

Identification of Threats using Nmap and Metasploit Network Security Tools
|9
|1788
|54