- Web Penetration Testing with Kali Linux(Third Edition)
- Gilberto Najera Gutierrez Juned Ahmed Ansari
- 90字
- 2021-06-24 18:44:49
Vulnerability assessment
At times, organizations might want only to identify the vulnerabilities that exist in their systems without actually exploiting them and gaining access. Vulnerability assessments are broader than penetration tests. The end result of vulnerability assessment is a report prioritizing the vulnerabilities found, with the most severe ones listed at the top and the ones posing a lesser risk appearing lower in the report. This report is very helpful for clients who know that they have security issues and who need to identify and prioritize the most critical ones.
推薦閱讀
- 操作系統實用教程(Linux版)
- 嵌入式Linux開發技術
- Mastering vRealize Operations Manager(Second Edition)
- Linux設備驅動開發詳解(第2版)
- Linux Mint Essentials
- Ubuntu Linux操作系統
- Kali Linux 2018:Windows Penetration Testing
- Django Project Blueprints
- 分布式系統設計實踐
- iOS 10快速開發:18天零基礎開發一個商業應用
- Java EE 7 Developer Handbook
- CSS揭秘
- Azure Resource Manager Templates Quick Start Guide
- 鴻蒙HarmonyOS應用開發入門
- Mastering Eclipse Plug-in Development