Important Notice: Our web hosting provider recently started charging us for additional visits, which was unexpected. In response, we're seeking donations. Depending on the situation, we may explore different monetization options for our Community and Expert Contributors. It's crucial to provide more returns for their expertise and offer more Expert Validated Answers or AI Validated Answers. Learn more about our hosting issue here.

How will ITC and HSCS identify vulnerabilities?

0
Posted

How will ITC and HSCS identify vulnerabilities?

0

Security vulnerabilities on a given device are usually discovered as the result of an investigation of a problem reported from someone within or outside the University, who is being attacked from that device, or during an audit conducted by the University’s Audit Department or other auditing organizations. ITC also offers a proactive network scanning service, that can report vulnerabilities to the person requesting the scan, before the security holes actually cause problems. As already stated, ITC and HSCS will make an attempt to resolve the problem in collaboration with the device owner or overseer before taking action, unless the situation is so urgent that immediate action is required.

Related Questions

What is your question?

*Sadly, we had to bring back ads too. Hopefully more targeted.

Experts123