This blog was written by a third party author
What is vulnerability scanning?
Vulnerability scanning is the process of detecting and classifying potential points of exploitation in network devices, computer systems, and applications. This is done by inspecting the same attack areas used by both internal and external threat actors—such as firewalls, applications, and services that are deployed either internally or externally—to gain unauthorized access to an organization’s network and assets. Scans are compared against a database of known vulnerabilities to see security gaps in networks, systems, and applications to be identified—and fixed—quickly.
Who performs vulnerability scans?
Scans are performed by internal IT security teams or managed security service providers (MSSPs), as part of a vulnerability assessment that should be a part of a greater vulnerability management program. In some cases, scans are mandated by compliance regulations and require external…
Posted by: Nick Cavalancia |
The post Vulnerability scanning explained appeared first on Cybersecurity Insiders.
July 31, 2020 at 09:13PM
0 comments:
Post a Comment