Search1 Result

The purpose of this article is to outline the steps in IT vulnerability management to ensure that appropriate tools and methodologies are used to assess vulnerabilities in systems or applications, and to provide remediation. This is UAH’s implementation in support of policy 06.01.02 Security of IT Resources.