vulnerability process
Vulnerability Assessment
The third-party pen tester used the free tool Open Vulnerability Assessment Scanner (OpenVAS) to scan Mercury USA’s network. Review the report from the OpenVAS Scan.
As you review the scan, consider some important points from Lesson 5:
- Priority
- Difficulty of implementation
- Communication/change control
- Inhibitors to remediation
- MOUs
- SLAs
- Business process interruption
- Degrading functionality