Office: Information Technology
Funding Source: Fee for Service
The Vulnerability Assessment will evaluate assets in an enterprise for missing patches and misconfigurations. The vulnerability assessment supports regulatory compliance (FERPA) with a standard.
The process will identify and prioritize vulnerabilities based on criteria inlcuding the likelihood of vulnerability exploitation and vulnerability severity.
These criteria will be used to categorize the vulnerability as Critical, High, Medium, Low, or Informational.