IT components, such as operating systems, application software, and networks have many vulnerabilities. These vulnerabilities are open to compromise or exploitation. This provides a possibility of penetrating into systems that result in unauthorized access.
Vulnerability tests are done to identify vulnerabilities and penetration tests are conducted to check the possibility of compromising systems such that the established access control mechanisms may be defeated and the unauthorized access gained.
Otherwise, systems can be shutdown or overloaded with malicious data using techniques such as the denial of service attacks such that access by legitimate users or processes maybe denied.
The primary purpose of vulnerability ...