Save
Vulnerability Managment
Vulnerability Scanner
Save
Share
Learn
Content
Leaderboard
Learn
Created by
Angel Martinez
Visit profile
Subdecks (1)
Penetration Testing
Vulnerability Managment > Vulnerability Scanner
6 cards
Cards (17)
Vulnerability Scanner
Software tool used to
automatically
scan and detect
vulnerabilities
within a system or network
Vulnerability Assessment
Process of identifying, quantifying, and
prioritizing vulnerabilities
within a system or
network
Network Monitors
Tools or systems used to monitor network
traffic
and activities for
suspicious
behavior or anomalies
Netflow
Network
protocol used for monitoring and collecting
IP traffic
data to analyze and optimize network performance and security
System
Monitors
Tools or systems used to monitor the performance,
health
, and
security
of individual computer systems or servers
System Logs
Records generated by computer systems or applications that capture
events
, actions, and
errors
for diagnostic, auditing, and security purposes
Antivirus
Software designed to detect, prevent, and remove
malicious
software (
malware
) from a computer or network
Data Loss
Prevention
(
DLP
)
Strategy, tools, and processes used to prevent the
unauthorized
loss or
leakage
of sensitive data
Security Information and Event Management (SIEM)
Software solution that provides real-time analysis of security alerts generated by
network devices
and
applications
Reporting
Process of documenting and communicating findings, insights, and
recommendations
related to
cybersecurity
activities and incidents
Alert Tuning
Process of configuring security alerts to reduce
false positives
and improve the effectiveness of
threat detection
See all 17 cards