- Web Penetration Testing with Kali Linux(Third Edition)
- Gilberto Najera Gutierrez Juned Ahmed Ansari
- 90字
- 2021-06-24 18:44:49
Vulnerability assessment
At times, organizations might want only to identify the vulnerabilities that exist in their systems without actually exploiting them and gaining access. Vulnerability assessments are broader than penetration tests. The end result of vulnerability assessment is a report prioritizing the vulnerabilities found, with the most severe ones listed at the top and the ones posing a lesser risk appearing lower in the report. This report is very helpful for clients who know that they have security issues and who need to identify and prioritize the most critical ones.
推薦閱讀
- Windows Server 2019 Cookbook
- Linux實戰(zhàn)
- 白話區(qū)塊鏈
- 構(gòu)建可擴展分布式系統(tǒng):方法與實踐
- Linux集群和自動化運維
- 高性能Linux服務(wù)器構(gòu)建實戰(zhàn):系統(tǒng)安全、故障排查、自動化運維與集群架構(gòu)
- 嵌入式實時操作系統(tǒng):RT-Thread設(shè)計與實現(xiàn)
- 無蘋果不生活 The New iPad隨身寶典
- Linux命令行大全(第2版)
- INSTANT Migration from Windows Server 2008 and 2008 R2 to 2012 How-to
- Python UNIX和Linux系統(tǒng)管理指南
- Introduction to R for Quantitative Finance
- Learning BeagleBone
- Advanced Infrastructure Penetration Testing
- 嵌入式微系統(tǒng)