{"id":16076,"date":"2023-03-16T12:55:30","date_gmt":"2023-03-16T11:55:30","guid":{"rendered":"https:\/\/www.whysecurity.it\/vulnerability-assessment\/"},"modified":"2023-03-22T17:53:07","modified_gmt":"2023-03-22T16:53:07","slug":"vulnerability-assessment","status":"publish","type":"page","link":"https:\/\/www.whysecurity.it\/en\/vulnerability-assessment\/","title":{"rendered":"Vulnerability Assessment"},"content":{"rendered":"<p>[vc_row full_width=&#8221;stretch_row&#8221; css_animation=&#8221;bounceInDown&#8221; gradient_colors=&#8221;%5B%7B%7D%5D&#8221; css=&#8221;.vc_custom_1529503216101{padding-top: 30px !important;padding-bottom: 80px !important;}&#8221;][vc_column][vc_custom_heading text=&#8221;Vulnerability analysis and assessments in relation to the customer context.&#8221; font_container=&#8221;tag:h2|font_size:44px|text_align:center|color:%23000000&#8243; google_fonts=&#8221;font_family:Raleway%3A100%2C200%2C300%2Cregular%2C500%2C600%2C700%2C800%2C900|font_style:400%20regular%3A400%3Anormal&#8221;][common_title title=&#8221;&#8221; show_decor=&#8221;true&#8221;][vc_column_text css_animation=&#8221;fadeInRight&#8221;]The analysis of the system vulnerabilities are contextualized to the <strong>REAL<\/strong> actual needs of the customer: the <strong>analysis of the vulnerabilities<\/strong> that could be exploited in relation to the economic risk involved which, in case of discovery, could actually weigh on the company.[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; equal_height=&#8221;yes&#8221; css_animation=&#8221;none&#8221; bgimage=&#8221;12054&#8243; bgstyle=&#8221;jarallax&#8221; ptextcolor=&#8221;White&#8221; gradient_colors=&#8221;%5B%7B%7D%5D&#8221; css=&#8221;.vc_custom_1585664322371{margin-left: -15px !important;padding-top: 60px !important;padding-bottom: 80px !important;background-color: #231e1f !important;}&#8221; el_class=&#8221;bianco&#8221;][vc_column][vc_custom_heading text=&#8221;Method&#8221; font_container=&#8221;tag:h2|font_size:44|text_align:center&#8221; google_fonts=&#8221;font_family:Raleway%3A100%2C200%2C300%2Cregular%2C500%2C600%2C700%2C800%2C900|font_style:400%20regular%3A400%3Anormal&#8221;][common_title title=&#8221;&#8221; show_decor=&#8221;true&#8221;][vc_row_inner equal_height=&#8221;yes&#8221; gradient_colors=&#8221;%5B%7B%7D%5D&#8221; el_class=&#8221;equal-height-content&#8221; css=&#8221;.vc_custom_1539260614930{background-color: #231e1f !important;}&#8221;][vc_column_inner width=&#8221;5\/6&#8243;][vc_column_text css_animation=&#8221;fadeInLeft&#8221; css=&#8221;.vc_custom_1629728941465{padding-top: 20px !important;padding-right: 20px !important;padding-bottom: 20px !important;padding-left: 20px !important;}&#8221;]The approach method is different depending on the type of context in which the customer operates, the surface potentially exposed to an attack and the acceptable residual risk.<\/p>\n<p><strong>Depending on what emerged in the initial analysis phase, one or more technologies will be chosen with which to perform the vulnerability analysis by carefully evaluating the results to the customer&#8217;s context.<\/strong><\/p>\n<p>The technical vulnerability of an application is NOT an indicator of absolute danger, but it becomes only after careful contextualization to the business processes, the nature of the information processed and the acceptable risk for the customer.[\/vc_column_text][\/vc_column_inner][vc_column_inner el_class=&#8221;industriaUno&#8221; width=&#8221;1\/6&#8243; css=&#8221;.vc_custom_1630412291459{padding-top: 30% !important;padding-bottom: 30% !important;}&#8221; offset=&#8221;vc_hidden-xs&#8221;][vc_single_image image=&#8221;12183&#8243; alignment=&#8221;right&#8221;][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[vc_row full_width=&#8221;stretch_row&#8221; css_animation=&#8221;bounceInDown&#8221; gradient_colors=&#8221;%5B%7B%7D%5D&#8221; css=&#8221;.vc_custom_1529503216101{padding-top: 30px !important;padding-bottom: 80px !important;}&#8221;][vc_column][vc_custom_heading text=&#8221;Vulnerability analysis and assessments in relation to the customer context.&#8221; font_container=&#8221;tag:h2|font_size:44px|text_align:center|color:%23000000&#8243; google_fonts=&#8221;font_family:Raleway%3A100%2C200%2C300%2Cregular%2C500%2C600%2C700%2C800%2C900|font_style:400%20regular%3A400%3Anormal&#8221;][common_title title=&#8221;&#8221; show_decor=&#8221;true&#8221;][vc_column_text css_animation=&#8221;fadeInRight&#8221;]The analysis of the system vulnerabilities are contextualized to the REAL actual needs of the customer: the analysis of the vulnerabilities that could be exploited in relation to the economic risk involved [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":15958,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Vulnerability Assessment - Why Security<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.whysecurity.it\/en\/vulnerability-assessment\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Vulnerability Assessment - Why Security\" \/>\n<meta property=\"og:description\" content=\"[vc_row full_width=&#8221;stretch_row&#8221; css_animation=&#8221;bounceInDown&#8221; gradient_colors=&#8221;%5B%7B%7D%5D&#8221; css=&#8221;.vc_custom_1529503216101{padding-top: 30px !important;padding-bottom: 80px !important;}&#8221;][vc_column][vc_custom_heading text=&#8221;Vulnerability analysis and assessments in relation to the customer context.&#8221; font_container=&#8221;tag:h2|font_size:44px|text_align:center|color:%23000000&#8243; google_fonts=&#8221;font_family:Raleway%3A100%2C200%2C300%2Cregular%2C500%2C600%2C700%2C800%2C900|font_style:400%20regular%3A400%3Anormal&#8221;][common_title title=&#8221;&#8221; show_decor=&#8221;true&#8221;][vc_column_text css_animation=&#8221;fadeInRight&#8221;]The analysis of the system vulnerabilities are contextualized to the REAL actual needs of the customer: the analysis of the vulnerabilities that could be exploited in relation to the economic risk involved [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.whysecurity.it\/en\/vulnerability-assessment\/\" \/>\n<meta property=\"og:site_name\" content=\"Why Security\" \/>\n<meta property=\"article:modified_time\" content=\"2023-03-22T16:53:07+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.whysecurity.it\/wp-content\/uploads\/2021\/09\/iStock-1166272744-e1630580359932-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1264\" \/>\n\t<meta property=\"og:image:height\" content=\"368\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.whysecurity.it\/en\/vulnerability-assessment\/\",\"url\":\"https:\/\/www.whysecurity.it\/en\/vulnerability-assessment\/\",\"name\":\"Vulnerability Assessment - Why Security\",\"isPartOf\":{\"@id\":\"https:\/\/www.whysecurity.it\/it\/#website\"},\"datePublished\":\"2023-03-16T11:55:30+00:00\",\"dateModified\":\"2023-03-22T16:53:07+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.whysecurity.it\/en\/vulnerability-assessment\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.whysecurity.it\/en\/vulnerability-assessment\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.whysecurity.it\/en\/vulnerability-assessment\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.whysecurity.it\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Vulnerability Assessment\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.whysecurity.it\/it\/#website\",\"url\":\"https:\/\/www.whysecurity.it\/it\/\",\"name\":\"Why Security\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.whysecurity.it\/it\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Vulnerability Assessment - Why Security","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.whysecurity.it\/en\/vulnerability-assessment\/","og_locale":"en_US","og_type":"article","og_title":"Vulnerability Assessment - Why Security","og_description":"[vc_row full_width=&#8221;stretch_row&#8221; css_animation=&#8221;bounceInDown&#8221; gradient_colors=&#8221;%5B%7B%7D%5D&#8221; css=&#8221;.vc_custom_1529503216101{padding-top: 30px !important;padding-bottom: 80px !important;}&#8221;][vc_column][vc_custom_heading text=&#8221;Vulnerability analysis and assessments in relation to the customer context.&#8221; font_container=&#8221;tag:h2|font_size:44px|text_align:center|color:%23000000&#8243; google_fonts=&#8221;font_family:Raleway%3A100%2C200%2C300%2Cregular%2C500%2C600%2C700%2C800%2C900|font_style:400%20regular%3A400%3Anormal&#8221;][common_title title=&#8221;&#8221; show_decor=&#8221;true&#8221;][vc_column_text css_animation=&#8221;fadeInRight&#8221;]The analysis of the system vulnerabilities are contextualized to the REAL actual needs of the customer: the analysis of the vulnerabilities that could be exploited in relation to the economic risk involved [&hellip;]","og_url":"https:\/\/www.whysecurity.it\/en\/vulnerability-assessment\/","og_site_name":"Why Security","article_modified_time":"2023-03-22T16:53:07+00:00","og_image":[{"width":1264,"height":368,"url":"https:\/\/www.whysecurity.it\/wp-content\/uploads\/2021\/09\/iStock-1166272744-e1630580359932-1.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.whysecurity.it\/en\/vulnerability-assessment\/","url":"https:\/\/www.whysecurity.it\/en\/vulnerability-assessment\/","name":"Vulnerability Assessment - Why Security","isPartOf":{"@id":"https:\/\/www.whysecurity.it\/it\/#website"},"datePublished":"2023-03-16T11:55:30+00:00","dateModified":"2023-03-22T16:53:07+00:00","breadcrumb":{"@id":"https:\/\/www.whysecurity.it\/en\/vulnerability-assessment\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.whysecurity.it\/en\/vulnerability-assessment\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.whysecurity.it\/en\/vulnerability-assessment\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.whysecurity.it\/en\/"},{"@type":"ListItem","position":2,"name":"Vulnerability Assessment"}]},{"@type":"WebSite","@id":"https:\/\/www.whysecurity.it\/it\/#website","url":"https:\/\/www.whysecurity.it\/it\/","name":"Why Security","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.whysecurity.it\/it\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/www.whysecurity.it\/en\/wp-json\/wp\/v2\/pages\/16076"}],"collection":[{"href":"https:\/\/www.whysecurity.it\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.whysecurity.it\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.whysecurity.it\/en\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.whysecurity.it\/en\/wp-json\/wp\/v2\/comments?post=16076"}],"version-history":[{"count":5,"href":"https:\/\/www.whysecurity.it\/en\/wp-json\/wp\/v2\/pages\/16076\/revisions"}],"predecessor-version":[{"id":16123,"href":"https:\/\/www.whysecurity.it\/en\/wp-json\/wp\/v2\/pages\/16076\/revisions\/16123"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.whysecurity.it\/en\/wp-json\/wp\/v2\/media\/15958"}],"wp:attachment":[{"href":"https:\/\/www.whysecurity.it\/en\/wp-json\/wp\/v2\/media?parent=16076"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}