Skip to main content

What is Vulnerability Assessment?

A vulnerability assessment can be understood as an evaluation of security weaknesses in an information system. Depending on the results of the evaluation, the system assigns specific severity levels to known vulnerabilities and also recommends measures for remediation or mitigation. There are several types of vulnerability assessments including host assessment, network, and wireless assessment, and database assessment. For more information on how to conduct vulnerability assessments in your organization, please refer to IT Support Joplin.

What is the Security Vulnerability Assessment Process?

There are many elements to consider when developing a security vulnerability assessment program, including identifying vulnerabilities and prioritizing them. While there are various methods that can be used to assess risk, the process presented here is one example of how you could approach this task.

Vulnerability Assessment

Vulnerability Identification

After you’ve completed your risk assessment, you can begin to identify potential vulnerabilities. The purpose of this activity is to identify threats that could be exploited by an attacker and how they might do so.

Once identified, the most important step is to determine what countermeasures are available to mitigate those risks. For example, if a critical system has no backups or fails to encrypt data on its local hard drive, then it’s a good idea for someone on your team (or possibly experts from reliable MSPs like IT Consulting Joplin) who know how encryption works to help set up some sort of authentication process before that system goes live.

Vulnerability Analysis

Vulnerability analysis is the process of identifying vulnerabilities in a system. It is an important part of the vulnerability assessment process, as it helps identify and prioritize vulnerabilities for remediation.

Vulnerability analysis can be performed manually or automatically. Manual analysis requires a detailed investigation of each point where a threat could potentially gain access to sensitive data or perform malicious actions on your systems, such as scanning an application for SQL injection vulnerabilities or checking all URLs that are accessed by visitors to your website against blacklists maintained by security companies. Automated tools may perform some aspects of this process for you but often require human intervention if they find suspicious activity on your network or system.

Risk Assessment

The Risk Assessment step is where you identify and assess risks. The goal of this process is to determine which vulnerabilities are most important and therefore should be fixed first. You can do this by prioritizing the list of security vulnerabilities that were identified in your Vulnerability Scan.

It’s important to note that risk assessment isn’t just about calculating probability and impact – it also involves making decisions based on the risks themselves. For example, imagine that there are two security vulnerabilities on your list: one has a high probability of being exploited but with minimal impact, if exploited; another has low probability but could have catastrophic consequences if exploited. In this case, you may decide that fixing the first vulnerability is more urgent than fixing the second one because it’s more likely to be exploited soon or someone else will exploit it first before you can fix it yourself.


Remediation is the process of fixing a vulnerability. This can be done with or without the help of a vendor and can be done in-house. Manual remediations are typically used when there are a small number of vulnerabilities that need to be fixed, while automation is usually used when there are many more vulnerabilities to remediate.

There are several different methods for remediating vulnerabilities including:

  • Patching – A software patch is an update provided by a vendor that fixes security issues in their product’s code
  • Removing or disabling access to vulnerable services – Some services may not be necessary for your organization’s needs, so it may make sense to remove them from your environment until they’re fixed
  • Disabling unsafe protocols and ciphers – You should disable any unsafe protocols/ciphers in use on your network so they don’t get used by hackers


Once a vulnerability has been identified, the next step is to mitigate it. Mitigation is the process of reducing risk by either removing the vulnerability or reducing exposure to it.

Mitigation can be done before or after a vulnerability is identified and often involves various actions:

  • Removing the vulnerability entirely through code changes or remediating hardware/software components
  • Reducing exposure by implementing security controls such as firewalls, intrusion detection systems (IDS), data loss prevention (DLP) systems, and antivirus software
  • Implementing procedures like patch management programs that ensure patches are applied in a timely manner across all systems within an organization’s IT environment

To summarize, there are many different methods of assessing your network for vulnerabilities. The key is to make sure that you have a process in place to identify and fix the issues before they become a problem. Information Security Joplin recommends using vulnerability scanners with real-time updates to help keep track of what needs attention first.