1
410views
Introduction of Vulnerability Scanning, and also define two types of vulnerability scanning tools.
1 Answer
0
4views

Solution

  • Vulnerability scanning usually refers to the scanning of systems that are connected to the Internet.

  • The art of vulnerability scanning has improved significantly over the past 30 years. Early scanners were little more than Unix shell scripts that checked patch levels, or Perl scripts that parsed system configuration files and checked file permissions.

  • It can also refer to system scanning or audits on internal networks that are not connected to the Internet in order to assess the threat of malicious software.

  • It is possible to know the basic security measures when installing and managing network and websites.

  • But it is not possible to catch all the vulnerabilities reside in the network and websites.

  • The vulnerability scanners provide you the automate security auditing and play an important role in your IT security.

    There are generally two types of vulnerability scanning tools:

  • Network-based scanning tool:

  • Network-based scanning tools send network traffic to various network hosts and devices with the goal of gathering information that will indicate whether those systems have holes that can be exploited.

  • Host-based scanning tool:

  • Host-based scanning tools are run on each host to scan for a wide range of system problems including: unauthorized software, unauthorized accounts, unprotected logins, weak passwords and inappropriate access permissions.

Please log in to add an answer.