vulnerability assessment


Also found in: Acronyms, Wikipedia.
Related to vulnerability assessment: Risk assessment

vulnerability assessment

A Department of Defense, command, or unit-level evaluation (assessment) to determine the vulnerability of a terrorist attack against an installation, unit, exercise, port, ship, residence, facility, or other site. Identifies areas of improvement to withstand, mitigate, or deter acts of violence or terrorism.
References in periodicals archive ?
EPA that they have developed or revised an emergency response plan on the basis of results from the vulnerability assessment.
This will include explanations of how the vulnerability assessment ties to and complements existing security-auditing methods.
These audits are usually performed via the Internet, from partner networks, and remote offices using hacking techniques or commercially available vulnerability assessment tools.
Marketing consultancy company Frost & Sullivan has completed an analysis report looking into the European vulnerability assessment and intrusion detection system market.
Under this contract, NSF will be utilizing NETSEC's Network Security Operations Center and Government Services Group to provide remote 24x7x365 management and monitoring of Intrusion Detection Systems (IDS), internal vulnerability assessments and on-going analysis, integration and implementation of security products.
com), World Vulnerability Assessment Products Markets, finds that the market earned revenues of $297.
Enterprise Security Manager provides vulnerability assessment capabilities on machines that have executed one or both of the fraudulent certificates.
The companies will combine CYRANO's Internet application testing systems with Networks Vigilance's network and firewall vulnerability assessment tools and ASP-based vulnerability assessment services.
For two years in a row, Watchfire has been named by IDC as the worldwide market share leader in web application vulnerability assessment software.
Only through this combination will developers begin to incorporate vulnerability assessment results into their application development process.
REM integrates attack-related information, local vulnerability assessment data and network vulnerability assessment data, providing organizations with a complete view of their enterprise security posture.
This latest industry accolade joins the growing list of honors that CORE IMPACT received during the past year, including top honors in the eWeek Excellence Awards for Best Vulnerability Assessment & Remediation Solution, SC Magazine Reader Trust Award for Best Security Audit Product, the Info Security Products Guide "Hot Companies" 2006 Award and the company's recognition by leading analyst firm Gartner as a "Cool Vendor in Security and Privacy.

Full browser ?