ENTRY LEVEL WORKER
Joined: 11 Jul 2013 Posts: 5
|
Posted: Thu Jul 11, 2013 11:27 pm Post subject: Potential Vulnerabilities |
|
The approach entails an active evaluation on the program for any potential vulnerabilities that could result from poor or improper system configuration, each identified and unknown hardware or computer software flaws, or operational weaknesses in method or technical countermeasures. This evaluation is carried out in the position of a prospective attacker and can involve active exploitation of security vulnerabilities. _________________ web application penetration test |
|