<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>vulnerability analysis Archives - Ethic Ninja – Jasa Pentest &amp; Audit Keamanan Informasi</title>
	<atom:link href="https://www.ethic.ninja/tag/vulnerability-analysis/feed" rel="self" type="application/rss+xml" />
	<link>https://www.ethic.ninja/tag/vulnerability-analysis</link>
	<description>Penyedia Audit Keamanan Siber &#38; Penetration Testing Indonesia</description>
	<lastBuildDate>Wed, 06 Jul 2022 23:31:27 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.1.10</generator>

<image>
	<url>https://www.ethic.ninja/wp-content/uploads/2019/09/favicon2019-100x100.png</url>
	<title>vulnerability analysis Archives - Ethic Ninja – Jasa Pentest &amp; Audit Keamanan Informasi</title>
	<link>https://www.ethic.ninja/tag/vulnerability-analysis</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Perbedaan Vulnerability Analysis (VA) dengan Penetration Testing</title>
		<link>https://www.ethic.ninja/2022/07/vulnerability-assessment-vulnerability-scanning-perbedaan-vulnerability-assessment-penetration-testing.html</link>
					<comments>https://www.ethic.ninja/2022/07/vulnerability-assessment-vulnerability-scanning-perbedaan-vulnerability-assessment-penetration-testing.html#comments</comments>
		
		<dc:creator><![CDATA[ninja]]></dc:creator>
		<pubDate>Wed, 06 Jul 2022 23:31:27 +0000</pubDate>
				<category><![CDATA[Ethical Hacking]]></category>
		<category><![CDATA[penetration testing]]></category>
		<category><![CDATA[vs]]></category>
		<category><![CDATA[vulnerability analysis]]></category>
		<category><![CDATA[vulnerability assessment]]></category>
		<category><![CDATA[vulnerability scanning]]></category>
		<guid isPermaLink="false">https://www.ethic.ninja/?p=6641</guid>

					<description><![CDATA[<p>Pada tulisan kali ini kami ingin memberikan gambaran apa itu perbedaan vulnerability analysis / vulnerability scanning / vulnerability assessment dengan Penetration Testing. Kalau kita perhatikan sebenarnya kedua hal ini Vulnerability Analysis (VA) dengan Penetration Testing (PT) memiliki fungsi yang sama yaitu sama-sama sebuah kegiatan yang dilakukan untuk mengetahui kerentanan suatu sistem, output dari kedua kegiatan ini juga sama-sama memberikan informasi ... </p>
<div><a href="https://www.ethic.ninja/2022/07/vulnerability-assessment-vulnerability-scanning-perbedaan-vulnerability-assessment-penetration-testing.html" class="more-link">Read More</a></div>
<p>The post <a rel="nofollow" href="https://www.ethic.ninja/2022/07/vulnerability-assessment-vulnerability-scanning-perbedaan-vulnerability-assessment-penetration-testing.html">Perbedaan Vulnerability Analysis (VA) dengan Penetration Testing</a> appeared first on <a rel="nofollow" href="https://www.ethic.ninja">Ethic Ninja –  Jasa Pentest &amp; Audit Keamanan Informasi</a>.</p>
]]></description>
		
					<wfw:commentRss>https://www.ethic.ninja/2022/07/vulnerability-assessment-vulnerability-scanning-perbedaan-vulnerability-assessment-penetration-testing.html/feed</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
	</channel>
</rss>
