Want to see the steps built into one tool?
‹View Table of Contents
The Vulnerability Management Life Cycle is intended to allow organizations to identify computer system security weaknesses; prioritize assets; assess, report, and remediate the weaknesses; and verify that they have been eliminated. In computer security, a vulnerability is a security flaw or weakness that allows an intruder to reduce a system’s information assurance. A vulnerability requires three elements: a system weakness, an intruder’s access to the weakness, and the intruder’s ability to exploit the weakness using a tool or technique. Steps in the Vulnerability Management Life CycleThe following diagram illustrates the steps in the Vulnerability Management Life Cycle. The steps in the Vulnerability Management Life Cycle are described below.
|