Vulnerability assessment (computing)

Vulnerability assessment is a process of defining, identifying and classifying the security holes in information technology systems.After the fixes are in place, another assessment can be run to verify that the vulnerabilities were actually resolved.This cycle of assess, patch, and re-assess has become the standard method for many organizations to manage their security issues.[2] Because of assessment report, the security administrator will be able to determine how intrusion occurred, identify compromised assets and take appropriate security measures to prevent critical damage to the system.A host assessment looks for system-level vulnerabilities such as insecure file permissions, application level bugs, backdoor and Trojan horse installations.
Vulnerability assessmentinformation technologyvulnerabilitypenetration testing