123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Computer-Programming >> View Article

Vulnerability Assessment

Profile Picture
By Author: Wisemonkeys
Total Articles: 277
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

What Is Vulnerability Assessment: -

A vulnerability assessment is a systematic review of security weaknesses in an information system. A vulnerability assessment is the process of defining, identifying, classifying and prioritizing vulnerabilities in computer systems, applications and network infrastructure.

Vulnerability assessments also provide an organization with the necessary knowledge, awareness and risk backgrounds to understand and react to threats to its environment.

Examples of threats that can be prevented by vulnerability assessment include:
1 SQL injection, XSS and other code injection attacks.
2 Escalation of privileges due to faulty authentication mechanisms.
3 Insecure defaults — software that ships with insecure settings, such as a
guessable admin password.

types of vulnerability assessments :-

Host assessment — The assessment of critical servers, which may be vulnerable to attacks if not adequately tested or not generated from a tested machine image.

Network and wireless assessment — The assessment of policies and
practices to prevent ...
... unauthorized access to private or public networks and network accessible resources.

Database assessment — The assessment of databases or big data systems for vulnerabilities and misconfigurations, identifying rogue databases or insecure dev/test environments, and classifying sensitive data across an organization’s infrastructure.

Application scans :– The identifying of security vulnerabilities in web applications and their source code by automated scans on the front-end or static/dynamic analysis of source code.

Vulnerability assessment: — Security scanning process

The security scanning process consists of four steps: testing, analysis, assessment and remediation.

Vulnerability identification (testing):-
The objective of this step is to draft a comprehensive list of an application’s vulnerabilities. Security analysts test the security health of applications, servers or other systems by scanning them with automated tools, or testing and evaluating them manually.

Analysts also rely on vulnerability databases, vendor vulnerability announcements, asset management systems and threat feeds to identify security weaknesses.
Vulnerability analysis:-
The objective of this step is to identify the source and root cause of the
vulnerabilities identified in step one.
It involves the identification of system components responsible for each vulnerability, and the root cause of the vulnerability. For example, the root cause of a vulnerability could be an old version of an open source library. This provides a clear path for remediation — upgrading the library.
Risk assessment:-
The objective of this step is the prioritizing of vulnerabilities. It involves security
analysts assigning a rank or severity score to each vulnerability, based on such
factors as:

1. Which systems are affected.
2. What data is at risk.
3. Which business functions are at risk.
4. Ease of attack or compromise.
5. Severity of an attack.
6. Potential damage as a result of the vulnerability

Remediation:-
The objective of this step is the closing of security gaps. It’s typically a joint effort by security staff, development and operations teams, who determine the most effective path for remediation or mitigation of each vulnerability.
Specific remediation steps might include:
1. Introduction of new security procedures, measures or tools.
2. The updating of operational or configuration changes.
3. Development and implementation of a vulnerability patch

Vulnerability assessment tools:-
Vulnerability assessment tools are designed to automatically scan for new and
existing threats that can target your application. Types of tools include:
1. Web application scanners that test for and simulate known attack patterns.
2. Protocol scanners that search for vulnerable protocols, ports and network
services.
3. Network scanners that help visualize networks and discover warning signals
like stray IP addresses, spoofed packets and suspicious packet generation from a single IP address.
It is a best practice to schedule regular, automated scans of all critical IT systems.
The results of these scans should feed into the organization’s ongoing vulnerability
assessment process.

Vulnerability assessment and WAF(Web application firewall):-
Imperva’s web application firewall helps protect against application vulnerabilities
in several ways:
1. As a gateway for all incoming traffic, it can proactively filter out malicious
visitors and requests, such as SQL injections and XSS attacks. This
eliminates the risk of data exposure to malicious actors.
2. It can perform virtual-patching — the auto-applying of a patch for a newly
discovered vulnerability at the network edge, giving developers and IT teams
the opportunity to safely deploy a new patch on the application without
concern.
3. Our WAF provides a view of security events. Attack Analytics helps
contextualize attacks and expose overarching threats,

Launched to world in 2017, Wisemonkeys(https://wisemonkeys.info/) is now a robust Learning management system.
Just follow a 3-step registration process and get connected. Since we appreciate genuine users and do not encourage spammers we follow small registration process:
1.Sign up(https://me.wisemonkeys.info/login)
2.Confirm your email. (for the first time the email might fall in your spam/junk/promotion folder. Please mark it not spam and confirm the link).
3.Login and get started.
4.Or Login via Google/Microsoft.

Our hardworking team is thriving hard to make this platform better and better. If you have any suggestions and feedback, then do write to us at: genius@wisemonkeys.info

Total Views: 127Word Count: 745See All articles From Author

Add Comment

Computer Programming Articles

1. The Dynamic Landscape Of Advertising Agencies In Indonesia: A Hub For Creativity And Innovation
Author: milestone

2. 10 Advantages Of Building A Career In Full Stack Java Development In Bhopal
Author: Rohan Rajput

3. Top Mobile App Development Company In Canada: Comprehensive Solutions For Your Business
Author: iTechnolabs

4. Democratizing Development: The Rise Of Low-code And No-code Platforms
Author: Techeunoia International

5. Amazon Product Listing Services: Boost Your Sales With Optimized Listings
Author: rachelvandereg

6. Best Accounting Software 2025 In Zambia: Tips And Best Practices
Author: Doris oseR

7. Aryabhata And The Birth Of Zero: A Legacy That Powers Modern Ai And Machine Learning
Author: Pydun Technology Private Limited

8. Top 5 Video Conferencing Solutions Of 2025
Author: Ben Gross

9. Best Practices For Building High-performance React Native Apps
Author: William

10. Top 10 Reasons To Pursue Full Stack Java Development In India
Author: Rohan Rajput

11. Transform Your Digital Presence With Expert Drupal Development
Author: manish

12. We Provide It Solutions That Help You Succeed
Author: We provide IT solutions that help you succeed

13. What Makes A Full Stack Developer Stand Out In 2025?
Author: Shrushti Gurav

14. Effortlessly Convert Sale Orders To Purchase Orders In Odoo
Author: CodersFort

15. Best Software Development Comapny In Wayanad, Kerala, India
Author: TRUSTWAVES

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: