Scanning is a set of procedures for identifying live hosts, ports, and services, discovering Operating system and architecture of target system, Identifying vulnerabilities and threats in the network. Network scanning is used to create a profile of the target organization.
Security scanning, or vulnerability scanning, can be simply described as
scanning the security of a website, web-based program, network, or file system
for either vulnerabilities or unwanted file changes.
Server security scanning is a type of preventative maintenance that needs
to be conducted on a regular basis. As a result of network security issues,
servers are very often put at risk. Examples of server types that need to be
monitored are exchange servers, proxy servers, web servers, file servers, print
servers, application servers, and many more.
Network scans work by running vulnerability tests on network components.
The tests look for faulty settings in the machines connected to the network,
the router, and the servers themselves. The tests look for misconfigured
internet protocols, server settings, weak passwords, and much more.
No comments:
Post a Comment