Basic: Vulnerability Assessment

This document serves as an introduction to the subject of security vulnerability assessments. It focuses primarily on vulnerability assessments performed from an external/remote location (like that of an actual hacking attack). In many situations the terms risk assessment and penetration test may be used interchangeably with vulnerability assessment.

Download the paper in PDF format here.

Don't miss