Vulnerability Assessments

A vulnerability assessment process that is intended to identify threats and the risks they pose typically involves the use of automated testing tools, such as network security scanners, whose results are listed in a vulnerability assessment report.

Vulnerability assessment types include the following:

  • Network-based scans are used to identify possible network security attacks. This type of scan can also detect vulnerable systems on wired or wireless networks

  • Host-based scans are used to locate and identify vulnerabilities in servers, workstations or other network hosts.

  • Wireless network scans of an organization’s Wi-Fi networks usually focus on points of attack in the wireless network infrastructure. In addition to identifying rogue access points, a wireless network scan can also validate that a company’s network is securely configured.

  • Application scans can be used to test websites in order to detect known software vulnerabilities and erroneous configurations in network or web applications.

  • Database scans can be used to identify the weak points in a database so as to prevent malicious attacks, such as SQL injection attacks.

Contact Us

  • Facebook
  • Twitter
  • LinkedIn