O'Reilly logo

BackTrack 4: Assuring Security by Penetration Testing by Shakeel Ali, Tedi Heriyanto

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 7. Vulnerability Mapping

Vulnerability Mapping is a process of identifying and analyzing the critical security flaws in the target environment. This terminology is also sometimes known as vulnerability assessment. It is one of the key areas of the vulnerability management program through which the security controls of an IT infrastructure can be analyzed against known and unknown vulnerabilities. Once the operations of information gathering, discovery, and enumeration have been completed, it is time to investigate the vulnerabilities that may exist in the target infrastructure which could lead to a compromise of the target and violation of the confidentiality, integrity, and availability of a business system.

In this chapter, we will ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required