Types of Vulnerability Assessments
Basically, a vulnerability assessment applies various
methods, tools, and scanners to find out grey areas, threats, and risks.
Everything depends on how well the weakness in the given systems is discovered
to attend to that specific need. Find below different types of vulnerability
assessment scans:
Network-based scans
Going by the name, it helps identify possible network security attacks. The scan helps zero-in the vulnerable systems on wired or wireless networks.
Going by the name, it helps identify possible network security attacks. The scan helps zero-in the vulnerable systems on wired or wireless networks.
Host-based scans
Server workstations or other network hosts vulnerabilities are easily identified using these scans. In the process, ports and services are examined vigorously. It also provides excellent visibility into the configuration settings and patch history of scanned systems.
Server workstations or other network hosts vulnerabilities are easily identified using these scans. In the process, ports and services are examined vigorously. It also provides excellent visibility into the configuration settings and patch history of scanned systems.
Wireless network scans
Wireless network infrastructure is scanned to identify vulnerabilities, it helps in validating a company’s network.
Wireless network infrastructure is scanned to identify vulnerabilities, it helps in validating a company’s network.
Application Scans
It is used to test websites to discover all known software vulnerabilities.
It is used to test websites to discover all known software vulnerabilities.
Database Scans
Database Scans aid in identifying grey areas in a database to prevent vicious attacks by cybercriminals.
Database Scans aid in identifying grey areas in a database to prevent vicious attacks by cybercriminals.
No comments:
Post a Comment