A vulnerability Assessment is theprocess of identifying, quantifying, and prioritizing (ranking) thevulnerabilities in a system. The discipline of vulnerabilityassessment comprises host-based vulnerability assessment,related to the inside configuration of a host, and network-basedvulnerability assessment, focused on the vulnerabilities visibleand exploitable on the network.Both kinds of vulnerability assessment arerequired for maximum effectiveness, as vulnerabilities can beexploited by an entity inside the security perimeter (i.e.alegitimate user), or initiated from outside the perimeter, by anunauthorised or illegitimate user.
Remote vs local attacks:Why we need VA ?
To create a healthy Network.
To prevent outside (unauthorised) user.
To be Hack proof
To create a secure software