internet.com
You are in the: Small Business Computing Channelarrow View Sites +
Small Business Technology
» ECommerce-Guide | Small Business Computing | Webopedia | WinPlanet |  »Close
Webopedia.com
Enter a word for a definition... ...or choose a computer category.
 
 

menu
   Home
   Term of the Day
   New Terms
   Pronunciation
   New Links
   Quick Reference
   Did You Know?
   Categories
   Tech Support
   Webopedia Jobs
   About Us
   Link to Us
   Advertising
  

talk to us
   Submit a URL
   Suggest a Term
   Report an Error

internet.com
Developer
Downloads
International
Internet Lists
Internet News
Internet Resources
IT
Linux/Open Source
Personal Technology
Small Business
Windows Technology
xSP Resources
Search internet.com
Advertise
Corporate Info
Newsletters
Tech Jobs
E-mail Offers
commerce
  Be a Commerce Partner
 
 
 
 
 
 
 
 
 
 
 
 
 
 

vulnerability scanning
Last modified: Tuesday, August 27, 2002 

The automated process of proactively identifying vulnerabilities of computing systems in a network in order to determine if and where a system can be exploited and/or threatened. While public servers are important for communication and data transfer over the Internet, they open the door to potential security breaches by threat agents, such as malicious hackers. Vulnerability scanning employs software that seeks out security flaws based on a database of known flaws, testing systems for the occurrence of these flaws and generating a report of the findings that an individual or an enterprise can use to tighten the network’s security.

Vulnerability scanning typically refers to the scanning of systems that are connected to the Internet but can also refer to system audits on internal networks that are not connected to the Internet in order to assess the threat of rogue software or malicious employees in an enterprise.

E-mail this definition to a colleague


For internet.com pages about vulnerability scanning . Also check out the following links!

Related Links

Security Scanning Is Not Risk Analysis
Many IT decision makers assume that performing a security vulnerability assessment is the same thing as risk analysis. However, these two processes are very different. (2002)

related categories

Ethics

Security

Software

related terms

DoS attack

firewall

hacker

intrusion detection system

port scanning

script kiddie


webopedia
Give Us Your
Feedback


Software
vulnerability scanning Products


Shop by Top Models:
Symantec Network Security 4.0
1 store offers from $2379 - $2379

Symantec Network Security 4.0
1 store offers from $29393 - $29393

Symantec Network Security 4.0
1 store offers from $1190 - $1190

Symantec Network Security 4.0
1 store offers from $10540 - $10540

Symantec Network Security 4.0
1 store offers from $5529 - $5529



JupiterWeb networks:

internet.comearthweb.comDevx.com graphics.com

Search JupiterWeb:

Jupitermedia Corporation has three divisions:
Jupiterimages, JupiterWeb and JupiterResearch


Legal Notices, Licensing, Reprints, & Permissions, Privacy Policy.

Jupitermedia Corporate Info | Newsletters | Tech Jobs | Shopping | E-mail Offers