C.vulnerability Assessment
C.vulnerability Assessment
Vulnerability Assessment
2
2 of 26
Vulnerability and Vulnerability Assessment
• Vulnerability: Vulnerability is a weakness in a system that can be exploited by an attacker to deliver an
attack to potentially compromise the confidentiality, integrity, or availability of data or resources.
• Vulnerability Assessment: Vulnerability assessment is the process of identifying security weaknesses
in a system. It evaluates the severity of the vulnerabilities that the system is susceptible to and suggests
ways to mitigate them.
3
3 of 26
Types of Vulnerability Assessments
● Network Vulnerability Assessment: Focuses on identifying vulnerabilities within network
infrastructure, such as routers, switches, firewalls, and other network devices.
● Host-Based Vulnerability Assessment: Concentrates on individual systems (hosts) within the network
and identifies vulnerabilities in operating systems, applications, etc.
● Web Application Vulnerability Assessment: Specifically targets vulnerabilities within web applications
and their underlying components.
● Database Vulnerability Assessment: Focuses on identifying vulnerabilities within databases and their
management systems (DBMS).
6
6 of 26
Quiz
1. What is a vulnerability assessment?
2. Which of the following is NOT a type of vulnerability assessment?
A) Network-based assessment
B) Host-based assessment
C) Database assessment
D) Marketing assessment
3. Why is vulnerability assessment important?
4. During a vulnerability assessment, which of the following vulnerabilities might be identified?
A) Unpatched software
B) Strong password policies
C) Well-configured firewalls
D) Efficient data backup processes
5. How often should vulnerability assessments be conducted?
7
7 of 26