Vulnerability Assessment Policies and Tools in Enterprise Networks
Journal: International Journal of Computer Science and Mobile Applications IJCSMA (Vol.5, No. 10)Publication Date: 2017-10-30
Authors : Madhavi Dhingra;
Page : 230-234
Keywords : Vulnerability Assessment; Network Security; Vulnerability;
Abstract
Vulnerability assessment takes a wide-range of network issues into consideration and identifies weaknesses that need correction, including misconfigurations and policy non-compliance vulnerabilities that a patch management system alone cannot address. It provides a comprehensive picture of all systems, services and devices that can breach a network, as well as a complete, prioritized list of vulnerabilities that need to be addressed. Remediation is the follow-up stage after vulnerabilities have been accurately identified. The two work hand-in-hand and form a complimentary process. This paper examines how vulnerability assessments are currently performed by following VA policies and procedures. It also discusses about the current vulnerability tools that are being used by the enterprises.
Other Latest Articles
- Automobile Routing Problem: A Survey on Protection of Sybil Attacks
- THE ESSENCE OF PARALLEL IMPORTS IN RUSSIA AND THE PROCESS OF ITS LEGALIZATION WITHIN THE FRAMEWORK OF THE UNIFIED ENERGY SYSTEM
- Important aspects of the bankseconomic security
- Role and Place of Law Enforcement Agencies In Legal State
- Modern problems of accounting and analytical support to the system of economic security
Last modified: 2017-11-14 22:22:50