CovertHart :: Vulnerability & Risk Assessment Request Form
Vulnerability & Risk Assessment Form
The intent of this form is to gather initial information about your environment and testing intent so that we can properly scope the activities. All information provided in this form is strictly confidential.
A vulnerability assessment is not as intrusive since it does not require an active infiltration of your computing environment. This test gives you a solid overview of the general health of your computing system and its vulnerabilities, but it does not provide the deeper insights of a real hacking event that a pen test offers.
A penetration test is a realistic simulation of an actual hacking attack, targeting vulnerabilities that may be present in your computing infrastructure and line servers. An ethical hacking event helps you to detect and analyze any points of weakness or failure so you can make specific corrections and improvements.