Abstract
Vulnerability assessment identifies security risks on assets in the form of software vulnerabilities, missing patches, and configuration weaknesses. It can be used for everything from operating systems and software applications, to Web applications and virtual environments. The data is graded in the form of vulnerability risks. There are many standards for reporting those risks and even more regulatory standards worldwide that grade the results and set service-level agreements for remediation and prioritization.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2018 Morey J. Haber, Brad Hibbert
About this chapter
Cite this chapter
Haber, M.J., Hibbert, B. (2018). Vulnerability States. In: Asset Attack Vectors. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4842-3627-7_8
Download citation
DOI: https://doi.org/10.1007/978-1-4842-3627-7_8
Published:
Publisher Name: Apress, Berkeley, CA
Print ISBN: 978-1-4842-3626-0
Online ISBN: 978-1-4842-3627-7
eBook Packages: Professional and Applied ComputingProfessional and Applied Computing (R0)Apress Access Books