The prime purpose of this article is to analysis about vulnerability assessment. A vulnerability assessment is used to calculate a system’s jeopardy position based on the system’s IT revelation. The jeopardy is defined as a purpose of threats, vulnerabilities, and asset value. An instance of a hazard is a discontented employee attempting to increase unauthorized entrance to the system. An instance of vulnerability is a method that does not necessitate verification for method access via the Internet.