Systematic examination of an information system or product to determine the adequacy of security measures, identify security deficiencies, provide data from which to predict the effectiveness of proposed security measures, and confirm the adequacy of such measures after implementation. Includes identifying, quantifying, and prioritizing (or ranking) vulnerabilities existing in the organization's Information Systems.
Comments
0 comments
Please sign in to leave a comment.