Reading (Mandatory) – Ciampa Chapter 15
Assignment – Post to the Week 14 conference in Discussions to the left.
Overview
For computer networks, a vulnerability assessment is like a comprehensive inspection that you have done on your vehicle before a long trip. The purpose of a vulnerability assessment is to uncover both known and unknown application weaknesses. Vulnerability assessments are also useful for testing your incident response procedures. This chapter covers the basics of discovering vulnerabilities and the steps you can take to mitigate (protect) those vulnerabilities.
Chapter Objectives