Managing the selection and scheduling of security audits run on a
computing network. The computer network is surveyed by a security audit
system to determine the function and relative importance of the elements
in the network. Based on function and priority, a more thorough type of
security audit is selected to run against each of the network elements by
the security audit system. The security audit can also be automatically
scheduled based on the information gathered from the survey. Once the
system runs the security audit, a vulnerability assessment can be
calculated for each element in the network. The vulnerability assessment
can be presented in a format that facilitates interpretation and response
by someone operating the system. The vulnerability assessment can also be
used to configure and schedule future security audits.