Research Article

System Health Monitoring Using a Novel Method: Security Unified Process

Table 9

Asset vulnerabilities.

ID Asset Vulnerability

V1 A1 (John Smith) No knowledge of file encoding using public keys
V2 A2 (Human Resource Application) Unchecked user input
V3 A3 (SQL_Server_1) Not using a mixed authentication mode
V4 A4 (DNS_1) Insufficient transaction ID space
V5 A5 (VLAN_1) Not properly configured
V6 A6 (Serve_Room_1) Unsuitable location