© Morey J. Haber, Brad Hibbert 2018
Morey J. Haber and Brad HibbertAsset Attack Vectorshttps://doi.org/10.1007/978-1-4842-3627-7_5

5. Vulnerability Assessment

Morey J. Haber1  and Brad Hibbert2
(1)
Heathrow, Florida, USA
(2)
Carp, Ontario, Canada
 

Vulnerability assessment is a process to assess the risk posed by vulnerabilities across the wide range of computers, applications, and devices across an organization. The result of the vulnerability scan provides a sense of the potential attack surface that may be leveraged by hackers to gain illegitimate access to systems, applications, and data. To gather this information, organizations may opt to engage in active vulnerability scanning, passive vulnerability scanning, or use a mix of both techniques. When ...

Get Asset Attack Vectors: Building Effective Vulnerability Management Strategies to Protect Organizations now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.