Vulnerability scanners, Computer Network Security

VULNERABILITY SCANNERS

Active vulnerability scanners scan networks for detailed information, it initiate traffic to determine security holes. This scanner identifies usernames and groups which are exposed, shows open network shares and exposes configuration and other vulnerabilities in servers.

A passive vulnerability scanner listens in on network and determines vulnerable versions of server and client software both. Passive vulnerability scanners have ability to find client side vulnerabilities that are not found in active scanners.

Posted Date: 10/9/2012 4:06:51 AM | Location : United States







Related Discussions:- Vulnerability scanners, Assignment Help, Ask Question on Vulnerability scanners, Get Answer, Expert's Help, Vulnerability scanners Discussions

Write discussion on Vulnerability scanners
Your posts are moderated
Related Questions
TRANSMISSION ERRORS:  Transmission exceptions may happen due to different causes for example power surges or interference may delete data during transmission. In result of wh

QUESTION : a) A datagram of 3000 bytes has to travel over a network with a MTU size of 1000 bytes. Describe how fragmentation can be used to solve this problem. You should pr

Q. Secure routing Protocols for Wireless Sensor Networks? A secure routing information protocol enables effective implementation of authentication and integrity checking defens

Question (a) Consider that you enter the subsequent URL in the address bar of a popular web client and that both the server and client accepts HTTP version 1.1. i. What can be

The Role of the Investigation The first phase, investigation is the most significant. What problem is the system being developed to solve? During investigation phase, objectives

Proof that the sender forwards the message. It also prohibits the author of the code from falsely denying that he forward the message. This is achieved by record using the exact ti

Question requires you to develop firewall rules based on a fictitious organisation. Scenario: You work for a security-conscious company, xC-Cure, who develop encryption te

DIRECT INDEXING It is less usually known method. It is possible only is cases where protocols address are given from a compact range. In the diagram below an example of direct

INTRODUCTION TO RISK MANAGEMENT Risk management is the procedure of identifying and controlling risks facing an organization. Risk management is the discipline which is employed

Is standard TCP effective in mobile wireless networks that operate with the IEEE 802.11 wireless local area network protocol?Discuss the issue