cyber-security

Vulnerability Assessment

, , No Comment

Vulnerability Assessment – Find vulnerabilities in a system or network – Better than just a port scanner. – Generally considered to be least intrusive. – Penetration testing / port scanning is considered more intrusive. Example:&hellip

Read Post →