You searched for:
“vulnerability analysis”
In computer operations, a systematic examination of an information system or product: A vulnerability analysis is used to determine the competence of security measures, recognize security deficits, furnish data from which to predict the efficiency of proposed security measures, and verify the adequacy of such measures after effectuation.