Principles of Information Security (MindTap Course List)
Principles of Information Security (MindTap Course List)
6th Edition
ISBN: 9781337102063
Author: Michael E. Whitman, Herbert J. Mattord
Publisher: Cengage Learning
Question
Book Icon
Chapter 12, Problem 12RQ
Program Plan Intro

Vulnerability assessment:

It is a process, which defines, identifies and classifies the security holes like vulnerabilities in a system network or communication infrastructure. It is also referred as “Vulnerability analysis”.

Penetration testing:

It is an authorized virtual attack on a system, which are performed to estimate the security of the computer system. It is also referred as “pen test”.

Blurred answer
Students have asked these similar questions
There is a significant difference between a vulnerability scan and a penetration test. Which tools work best for each of these methods?
What is the difference between vulnerability scanning and penetration testing? In what ways do they need certain types of apparatus?
What is the difference between vulnerability scanning and penetration testing? What are some of the tools that they might use to carry out each of their procedures?
Knowledge Booster
Background pattern image
Similar questions
SEE MORE QUESTIONS
Recommended textbooks for you
Text book image
Management Of Information Security
Computer Science
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:Cengage Learning,
Text book image
Principles of Information Security (MindTap Cours...
Computer Science
ISBN:9781337102063
Author:Michael E. Whitman, Herbert J. Mattord
Publisher:Cengage Learning