- Web Penetration Testing with Kali Linux(Third Edition)
- Gilberto Najera Gutierrez Juned Ahmed Ansari
- 90字
- 2021-06-24 18:44:49
Vulnerability assessment
At times, organizations might want only to identify the vulnerabilities that exist in their systems without actually exploiting them and gaining access. Vulnerability assessments are broader than penetration tests. The end result of vulnerability assessment is a report prioritizing the vulnerabilities found, with the most severe ones listed at the top and the ones posing a lesser risk appearing lower in the report. This report is very helpful for clients who know that they have security issues and who need to identify and prioritize the most critical ones.
推薦閱讀
- pcDuino開發(fā)實戰(zhàn)
- Linux操作系統(tǒng)基礎(chǔ)
- Red Hat Enterprise Linux 8系統(tǒng)管理實戰(zhàn)
- 鴻蒙生態(tài):開啟萬物互聯(lián)的智慧新時代
- 白話區(qū)塊鏈
- 構(gòu)建可擴展分布式系統(tǒng):方法與實踐
- 網(wǎng)絡(luò)操作系統(tǒng)教程:Windows Server 2016管理與配置
- Learning Magento 2 Administration
- Kali Linux高級滲透測試
- Linux系統(tǒng)最佳實踐工具:命令行技術(shù)
- UI設(shè)計手繪表現(xiàn)從入門到精通
- Web Penetration Testing with Kali Linux(Third Edition)
- Office 365 User Guide
- Linux內(nèi)核分析及應(yīng)用
- Python機器學(xué)習(xí)系統(tǒng)構(gòu)建(原書第3版)