Description: A vulnerability assessment is the process of identifying, quantifying, and prioritizing (or ranking) the vulnerabilities in a system. Examples of systems for which vulnerability assessments are performed include, but are not limited to, information technology systems, energy supply systems, water supply systems, transportation systems, and communication systems. Such assessments may be conducted on behalf of a range of different organizations, from small businesses up to large regional infrastructures. Vulnerability from the perspective of disaster management means assessing the threats from potential hazards to the population and to infrastructure. It may be conducted in the political, social, economic or environmental fields.
Credits : http://en.wikipedia.org/wiki/Vulnerability_assessment
This video explains in detail about Vulnerability Assessment . Following are the topic covered in video.
1. Asset identification
2. Threat evaluation
3. Vulnerability appraisal
4. Risk assessment
5. Risk Mitigation
Original Source : RCCNOS130 from youtube
Tags: Vulnerability , Assessment ,
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.
Also we can make our own VM checklist
http://seclists.org/basics/2009/Jan/119 Visit this site if you are more interested :)
nicely explained different steps of vulnerability assessment.