ABSTRACT

The goal of this six-step process is to maximize the time spent during the technical phases of a network vulnerability assessment (NVA). The hope for the process is that it will give anyone running an NVA the most “bang for the buck.” Each of the steps in the model builds on the previous steps. While it is possible to skip steps, it will often result in a less efficient NVA.