Wednesday, 22 January 2014

Vulnerability management lifecycle

  1. Discover
  2. Prioritize assets
  3. Assessment
  4. Reporting
  5. Remediation
  6. Verification

No comments:

Post a Comment

Ping does not work

Today I would like to discuss a banal situation: host A is directly connected to host B, ping from host A to host B does not work. What are...