Vulnerability Managment

Subdecks (3)

Cards (35)

  • Vulnerability Management
    The ongoing process of identifying, assessing, prioritizing, and mitigating vulnerabilities within a system or network.
  • Vulnerability Scan
    Automated process of identifying security vulnerabilities within a system or network using specialized software.
  • Threat Feed
    Stream of data containing information about current cybersecurity threats and vulnerabilities, often used to enhance threat intelligence.
  • Penetration Testing
    Methodical process of evaluating the security of a system or network by simulating attacks to identify potential vulnerabilities.