Chapter 7. Vulnerability Mapping
Vulnerability Mapping is a process of identifying and analyzing the critical security flaws in the target environment. This terminology is also sometimes known as vulnerability assessment. It is one of the key areas of the vulnerability management program through which the security controls of an IT infrastructure can be analyzed against known and unknown vulnerabilities. Once the operations of information gathering, discovery, and enumeration have been completed, it is time to investigate the vulnerabilities that may exist in the target infrastructure which could lead to a compromise of the target and violation of the confidentiality, integrity, and availability of a business system.
In this chapter, we will ...
Get BackTrack 4: Assuring Security by Penetration Testing now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.