Answer :
Answer:
Four steps to sound security vulnerability management
If you're bedeviled by swarms of alerts, you can take control by practicing good security vulnerability management with these four steps.
Inventory your systems. Know exactly what you're running so you know exactly what to worry about.
Manage the flow of information. Determine which information resources help you focus exclusively on the vulnerabilities that affect your systems.
Assess the information. Evaluate the actual risk to your organization's systems security.
Plan for response. Develop standard procedures to translate information into action.