Vulnerability assessment identifies security risks on assets in the form of software vulnerabilities, missing patches, and configuration weaknesses. It can be used for everything from operating systems and software applications, to Web applications and virtual environments. The data is graded in the form of vulnerability risks. There are many standards for reporting those risks and even more regulatory standards worldwide that grade the results and set service-level agreements for remediation and prioritization. ...
8. Vulnerability States
Get Asset Attack Vectors: Building Effective Vulnerability Management Strategies to Protect Organizations now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.