top of page
  • @Cyber509
  • 509Cyber

External Vulnerability Assessment

What is a Vulnerability?

In computer security, a vulnerability is a weakness which can be exploited by a Threat Actor, such as an attacker, to perform unauthorized actions within a computer system. To exploit a vulnerability, an attacker must have at least one applicable tool or technique that can connect to a system weakness. 

 

What is a Vulnerability Assessment?

A vulnerability assessment is the process of identifying, quantifying, and prioritizing the vulnerabilities in a system. Examples of systems for which vulnerability assessments are performed include, but are not limited to, information systems, energy supply systems, water supply systems, transportation systems, and communication systems. Such assessments may be conducted on behalf of a range of different organizations, from small businesses up to large regional infrastructures.

 

Vulnerability Assessment - Detailed

509 Cyber Solutions will work with your business to identify what domains or IP addresses you would like to scan and the frequency of the scanning. Once this is completed 509 Cyber will conduct scanning and review all reports. Once false positives have been ruled out a final report will be delivered to you, the customer for any remediation efforts.  

 

 

vuln.png
bottom of page