Latest posts

10/recent/ticker-posts

How To Perform A Vulnerability assessment

How To Perform A Vulnerability assessment, full Step by step guide


What is a Vulnerability ?

In cybersecurity, a vulnerability is a weakness that can be exploited by cyber-criminals to gain unauthorized access to a computer system.

what is a vulnerability assessment ?

A vulnerability assessment is an analysis of vulnerability/bugs in IT system at a certain point in time with the aim of identifying the system's weakness before hackers can get hold of theme.


Difference Between vulnerability assessment & Penetration Testing

  • Vulnerability:- 
Vulnerability assessment is an automated test, meaning a tool does all of the work and generate the report at the end.

  • Penetration Testing

Penetration testing, is a manual process depend on the knowledge and experience of a penetration tester.


What is the purpose of a Vulnerability Assessment ?

A vulnerability assessment test some or all of your systems & generates a detailed vulnerability report.
this report can then be used to fix the problems uncovered to avoid security breaches.



Step to conduct A vulnerability Assessment: -

  • Asset Discovery
First, you need to decide what you want to scan, the discovery aspect of this process can be targely automated.
  • Prioritization
Once you know what you've got, the next question is whether you can afford to run a vulnerability assessment on all of it.
Prioritization can help where budgets can't cover every asset the company owns.
  • Vulnerability Scanning
vulnerability assessment are designed to identify known security weakness and provide guidance on how to fix them.




Also Visit