Wednesday, May 8, 2019

Types of Vulnerability Assessments


Types of Vulnerability Assessments
Basically, a vulnerability assessment applies various methods, tools, and scanners to find out grey areas, threats, and risks. Everything depends on how well the weakness in the given systems is discovered to attend to that specific need. Find below different types of vulnerability assessment scans:


Network-based scans
Going by the name, it helps identify possible network security attacks. The scan helps zero-in the vulnerable systems on wired or wireless networks.
Host-based scans
Server workstations or other network hosts vulnerabilities are easily identified using these scans. In the process, ports and services are examined vigorously. It also provides excellent visibility into the configuration settings and patch history of scanned systems.
Wireless network scans
Wireless network infrastructure is scanned to identify vulnerabilities, it helps in validating a company’s network.
Application Scans
It is used to test websites to discover all known software vulnerabilities.
Database Scans
Database Scans aid in identifying grey areas in a database to prevent vicious attacks by cybercriminals.


No comments:

Post a Comment

Which Python course is best for beginners?

Level Up Your Python Prowess: Newbie Ninjas: Don't fret, little grasshoppers! Courses like "Learn Python 3" on Codecade...