Who needs vulnerability assessment?
Vulnerability Assessment is an important step in any database security initiative, providing you with an understanding of your current security posture. Once the results of the assessment are complete, you will have a full picture of where your sensitive data resides, the version of the database software, the patch level of those databases, and a wealth of information from penetration testing. Information on password strength, vulnerability to common threats such as SQL injection and buffer overflow, and the security of any PL/SQL-code, can all be used to plan an effective security policy.