O'Reilly logo

CISSP in 21 Days - Second Edition by M. L. Srinivasan

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Vulnerability assessment and mitigation

IT components, such as operating systems, application software, and networks have many vulnerabilities. These vulnerabilities are open to compromise or exploitation. This provides a possibility of penetrating into systems that result in unauthorized access.

Vulnerability tests are done to identify vulnerabilities and penetration tests are conducted to check the possibility of compromising systems such that the established access control mechanisms may be defeated and the unauthorized access gained.

Otherwise, systems can be shutdown or overloaded with malicious data using techniques such as the denial of service attacks such that access by legitimate users or processes maybe denied.

The primary purpose of vulnerability ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required