Reading (Mandatory) – Ciampa Chapter 15
Assignment – Post to the Week 14 conference in Discussions to the left.
For computer networks, a vulnerability assessment is like a comprehensive inspection that you have done on your vehicle before a long trip. The purpose of a vulnerability assessment is to uncover both known and unknown application weaknesses. Vulnerability assessments are also useful for testing your incident response procedures. This chapter covers the basics of discovering vulnerabilities and the steps you can take to mitigate (protect) those vulnerabilities.
- Define vulnerability assessment and explain why it is important
- Explain the differences between vulnerability scanning and penetration testing
- Describe the security implications of integration with third parties
- List techniques for mitigating and deterring attacks