Vulnerability Scanner

Subdecks (1)

Cards (17)

  • Vulnerability Scanner
    Software tool used to automatically scan and detect vulnerabilities within a system or network
  • Vulnerability Assessment
    Process of identifying, quantifying, and prioritizing vulnerabilities within a system or network
  • Network Monitors
    Tools or systems used to monitor network traffic and activities for suspicious behavior or anomalies
  • Netflow
    Network protocol used for monitoring and collecting IP traffic data to analyze and optimize network performance and security
  • System Monitors
    Tools or systems used to monitor the performance, health, and security of individual computer systems or servers
  • System Logs
    Records generated by computer systems or applications that capture events, actions, and errors for diagnostic, auditing, and security purposes
  • Antivirus
    Software designed to detect, prevent, and remove malicious software (malware) from a computer or network
  • Data Loss Prevention (DLP)

    Strategy, tools, and processes used to prevent the unauthorized loss or leakage of sensitive data
  • Security Information and Event Management (SIEM)
    Software solution that provides real-time analysis of security alerts generated by network devices and applications
  • Reporting
    Process of documenting and communicating findings, insights, and recommendations related to cybersecurity activities and incidents
  • Alert Tuning
    Process of configuring security alerts to reduce false positives and improve the effectiveness of threat detection