This document shall serve as an introduction to the subject of security vulnerability assessments. It will focus primarily on vulnerability assessments performed from an external / remote location (like that of an actual hacking attack).
In many situations the terms risk assessment and penetration test may be used interchangeably with vulnerability assessment.