Description
Methods of determining which vulnerabilities are present on which systems, Calculating the risk associated with a particular attack or vulnerability, Action taken to alleviate or minimize the risk. Methods of attacks. Vulnerability Scanners. Vulnerability Severity. Management of Vulnerability.