ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Vulnerability Assessment Policies and Tools in Enterprise Networks

Journal: International Journal of Computer Science and Mobile Applications IJCSMA (Vol.5, No. 10)

Publication Date:

Authors : ;

Page : 230-234

Keywords : Vulnerability Assessment; Network Security; Vulnerability;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

Vulnerability assessment takes a wide-range of network issues into consideration and identifies weaknesses that need correction, including misconfigurations and policy non-compliance vulnerabilities that a patch management system alone cannot address. It provides a comprehensive picture of all systems, services and devices that can breach a network, as well as a complete, prioritized list of vulnerabilities that need to be addressed. Remediation is the follow-up stage after vulnerabilities have been accurately identified. The two work hand-in-hand and form a complimentary process. This paper examines how vulnerability assessments are currently performed by following VA policies and procedures. It also discusses about the current vulnerability tools that are being used by the enterprises.

Last modified: 2017-11-14 22:22:50