<s>
Vulnerability	B-General_Concept
assessment	I-General_Concept
is	O
a	O
process	O
of	O
defining	O
,	O
identifying	O
and	O
classifying	O
the	O
security	O
holes	O
in	O
information	B-General_Concept
technology	I-General_Concept
systems	I-General_Concept
.	O
</s>
<s>
Before	O
deploying	O
a	O
system	O
,	O
it	O
first	O
must	O
go	O
through	O
from	O
a	O
series	O
of	O
vulnerability	B-General_Concept
assessments	I-General_Concept
that	O
will	O
ensure	O
that	O
the	O
build	O
system	O
is	O
secure	O
from	O
all	O
the	O
known	O
security	O
risks	O
.	O
</s>
<s>
Depending	O
on	O
the	O
system	O
a	O
vulnerability	B-General_Concept
assessment	I-General_Concept
can	O
have	O
many	O
types	O
and	O
level	O
.	O
</s>
<s>
Tools	O
like	O
COPS	B-Application
and	O
Tiger	O
are	O
popular	O
in	O
host	O
assessment	O
.	O
</s>
<s>
Vulnerability	B-General_Concept
assessment	I-General_Concept
and	O
penetration	O
testing	O
are	O
two	O
different	O
testing	O
methods	O
.	O
</s>
