Security Vulnerability Assessment

Tags Faculty Staff

A web vulnerability assessment is the process of identifying, quantifying, and prioritizing the vulnerabilities in a web site or web application.

 

About This Service

Key Features

  • Identify Vulnerabilities: A web vulnerability assessment can help to identify vulnerabilities that may exist in the University's web applications. By identifying vulnerabilities, Pitt IT can take steps to remediate them and reduce the risk of cyber attacks.
  • Test Defenses: A web vulnerability assessment can test the effectiveness of the University's security defenses, including firewalls, intrusion detection systems, and other security controls that protect web applications.
  • Compliance Requirements: Many compliance frameworks and regulations require web vulnerability assessments as a component of their security requirements. By conducting a web vulnerability assessment, Pitt IT can ensure that the University is meeting these requirements.
  • Improve Security Posture: A web vulnerability assessment can help to improve the overall security posture of the University by identifying and remediating vulnerabilities in web applications.
  • Mitigate Business Risks: A web vulnerability assessment can help to mitigate business risks associated with cyber attacks on web applications, such as data breaches or service disruptions.
  • Prioritize Remediation Efforts: A web vulnerability assessment can help to prioritize remediation efforts by identifying the most critical vulnerabilities that need to be addressed first.

Service Request Form

SecureWeb Site Enrollment Form

Getting and Using This Service

How do I access this service?

To get started Using Pitt SecureWeb:

  1. Create a new development website.
  2. Fill out an online form to provision a site project in Pitt SecureWeb.
    Note: A development (or staging) version and a production version of your site are always provisioned together as part of the creation process for a project.

    You will receive email notification when your project has been provisioned and is ready to be scanned.

  3. Log in to the secure web portal at secureweb.pitt.edu and request a scan for your project.

This provisioning process only needs to be carried out one time for a project. However, for each development (staging) and production website pair, you will need to carry out these steps again to create a new project. Returning users can access Pitt SecureWeb any time to request new scans, audit scan results, and resubmit project sites for additional scanning.

How do I request this service?

Submit a ticket by clicking the Request Help button on the upper right hand corner of this page.

Who can use this service?

Faculty, Staff

Support

How do I get help?

Submit a ticket by clicking the Request Help button on the upper right hand corner of this page.

 
Request Help

Related Articles (3)

Developed in response to compliance requirements, the Vulnerability Management program helps University units implement robust vulnerability management processes and procedures. It enables units to quickly identify and mitigate risks to University data and system, and it ensures Pitt remains in compliance with applicable laws and regulations.
How to request Pitt SecureWeb security scans for websites.
As our technology environment becomes more complex and related security threats increase, every University unit needs to use available tools and services to protect University information and resources.