Research Article
System Health Monitoring Using a Novel Method: Security Unified Process
Table 9
Asset vulnerabilities.
| ID | Asset | Vulnerability |
| V1 | A1 (John Smith) | No knowledge of file encoding using public keys | V2 | A2 (Human Resource Application) | Unchecked user input | V3 | A3 (SQL_Server_1) | Not using a mixed authentication mode | V4 | A4 (DNS_1) | Insufficient transaction ID space | V5 | A5 (VLAN_1) | Not properly configured | V6 | A6 (Serve_Room_1) | Unsuitable location |
|
|