Groups are described in the following table: Group High Security VulnerabilitiesĬlick on the High Security Vulnerabilities or Low Security Vulnerabilities sub–nodes for a list of weaknesses discovered while auditing a target device. The vulnerability level is indicated using color–coded graphical bar:Ĭlick on any Vulnerability Assessment node to view the security vulnerabilities identified on the target computer grouped by type and severity. The vulnerability level for Computer A is therefore HIGH. The score for each category was calculated with the following results:
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |