No Vulnerability 151 User id’s based on job description 152 No user identification and authentication 153 Weak password management system 154 Unrestricted use of system…
Information Security Vulnerability List – 1 No Vulnerability 1 Disposal or reuse of storage media without proper erasure 2 Inadequate change control 3 Inadequate network…