| http://www.w3.org/ns/prov#value | - Preferably, the calculation selection module allows a computer user to select one of the objective security scores to calculate. [0040] Still another embodiment of the present invention is a method for conducting an automated network vulnerability attack, the method comprising the steps of: (1) selecting a set of vulnerability attacks for each responsive computer on a network, each selected vulner
|