Save
Vulnerability Managment
Save
Share
Learn
Content
Leaderboard
Learn
Created by
Angel Martinez
Visit profile
Subdecks (3)
App Dev and Security
Vulnerability Managment
11 cards
Vulnerability Scanning
Vulnerability Managment
3 cards
Vulnerability Scanner
Vulnerability Managment
17 cards
Cards (35)
Vulnerability Management
The ongoing process of identifying, assessing, prioritizing, and mitigating vulnerabilities within a system or network.
Vulnerability Scan
Automated process of identifying security vulnerabilities within a system or network using specialized software.
Threat Feed
Stream of data containing information about current cybersecurity threats and vulnerabilities, often used to enhance threat intelligence.
Penetration Testing
Methodical process of evaluating the security of a system or network by simulating attacks to identify potential vulnerabilities.
See all 35 cards