A Breach, is a result of a Threat exploiting a weakness in any of the assets or applications. To decrease the likelihood of a breach, it is imperative to plug the weakness, and to plug them, they have to be identified.
Vulnerability Assessment (VA) is the process of identifying all the weaknesses in the organization’s IT assets. Another class of issues is Misconfiguration. Though these are not the classic vulnerabilities, but do render the asset vulnerable. These are checks performed against popularly accepted industry benchmarks like CIS (Center for Internet Security).
Recent Comments