What does vulnerability management mean?

Definitions for vulnerability management
vul·ner·a·bil·i·ty man·age·ment

Here are all the possible meanings and translations of the word vulnerability management.

Wikipedia

  1. Vulnerability management

    Vulnerability management is the "cyclical practice of identifying, classifying, prioritizing, remediating, and mitigating" software vulnerabilities. Vulnerability management is integral to computer security and network security, and must not be confused with Vulnerability assessment.Vulnerabilities can be discovered with a vulnerability scanner, which analyzes a computer system in search of known vulnerabilities, such as open ports, insecure software configurations, and susceptibility to malware infections. They may also be identified by consulting public sources, such as NVD, or subscribing to a commercial vulnerability alerting service such as Symantec's DeepSight Vulnerability Datafeed or Accenture's Vulnerability Intelligence Service. Unknown vulnerabilities, such as a zero-day, may be found with fuzz testing, which can identify certain kinds of vulnerabilities, such as a buffer overflow with relevant test cases. Such analysis can be facilitated by test automation. In addition, antivirus software capable of heuristic analysis may discover undocumented malware if it finds software behaving suspiciously (such as attempting to overwrite a system file). Correcting vulnerabilities may variously involve the installation of a patch, a change in network security policy, reconfiguration of software, or educating users about social engineering.

How to pronounce vulnerability management?

  1. Alex
    Alex
    US English
    Daniel
    Daniel
    British
    Karen
    Karen
    Australian
    Veena
    Veena
    Indian

How to say vulnerability management in sign language?

  1. vulnerabilitymanagement

Numerology

  1. Chaldean Numerology

    The numerical value of vulnerability management in Chaldean Numerology is: 5

  2. Pythagorean Numerology

    The numerical value of vulnerability management in Pythagorean Numerology is: 2

Images & Illustrations of vulnerability management

  1. vulnerability managementvulnerability managementvulnerability managementvulnerability managementvulnerability management

Translation

Find a translation for the vulnerability management definition in other languages:

Select another language:

  • - Select -
  • 简体中文 (Chinese - Simplified)
  • 繁體中文 (Chinese - Traditional)
  • Español (Spanish)
  • Esperanto (Esperanto)
  • 日本語 (Japanese)
  • Português (Portuguese)
  • Deutsch (German)
  • العربية (Arabic)
  • Français (French)
  • Русский (Russian)
  • ಕನ್ನಡ (Kannada)
  • 한국어 (Korean)
  • עברית (Hebrew)
  • Український (Ukrainian)
  • اردو (Urdu)
  • Magyar (Hungarian)
  • मानक हिन्दी (Hindi)
  • Indonesia (Indonesian)
  • Italiano (Italian)
  • தமிழ் (Tamil)
  • Türkçe (Turkish)
  • తెలుగు (Telugu)
  • ภาษาไทย (Thai)
  • Tiếng Việt (Vietnamese)
  • Čeština (Czech)
  • Polski (Polish)
  • Bahasa Indonesia (Indonesian)
  • Românește (Romanian)
  • Nederlands (Dutch)
  • Ελληνικά (Greek)
  • Latinum (Latin)
  • Svenska (Swedish)
  • Dansk (Danish)
  • Suomi (Finnish)
  • فارسی (Persian)
  • ייִדיש (Yiddish)
  • հայերեն (Armenian)
  • Norsk (Norwegian)
  • English (English)

Discuss these vulnerability management definitions with the community:

Word of the Day

Would you like us to send you a FREE new word definition delivered to your inbox daily?

Please enter your email address:


Citation

Use the citation below to add this definition to your bibliography:

Style:MLAChicagoAPA

"vulnerability management." Definitions.net. STANDS4 LLC, 2020. Web. 3 Apr. 2020. <https://www.definitions.net/definition/vulnerability+management>.

Are we missing a good definition for vulnerability management? Don't keep it to yourself...

Free, no signup required:

Add to Chrome

Get instant definitions for any word that hits you anywhere on the web!

Free, no signup required:

Add to Firefox

Get instant definitions for any word that hits you anywhere on the web!

Nearby & related entries:

Alternative searches for vulnerability management:


Thanks for your vote! We truly appreciate your support.