Vulnerability Scanner

March 2007
Network Dictionary;2007, p520
Reference Entry
An encyclopedia entry for "Vulnerability Scanner" in computer security is presented. It refers to a type of computer program specifically designed to search a given software or hardware system for security weaknesses. There are two ways by which the program can be used, either prophylactically or maliciously.


Related Articles

  • XFire helps pinpoint Web application bugs. Powell, Thomas // Network World;8/2/2004, Vol. 21 Issue 31, p36 

    Modern Web applications are a conglomerate of many individual moving parts. Web server software and hardware, application servers, database systems, custom developed applications, a variety of network devices, the network transport and, of course, the ever-present Web browser all present...

  • Information Leakage.  // Network Dictionary;2007, p244 

    A definition of the term "Information Leakage," in relation to computer security, is presented. It refers to obtaining useful information through vulnerabilities in hardware or software.

  • Vulnerability Scanning.  // Network Dictionary;2007, p520 

    An encyclopedia entry for "Vulnerability Scanning" in computer security is presented. It refers to the process of using some software or hardware tools to identify vulnerabilities of computing systems in a network in order to determine if and where a system can be exploited and/or threatened....

  • Hardware versus Software Approaches to Encrypting Data for Security. Toubbe, Karim // Database Trends & Applications;Dec2005, Vol. 19 Issue 12, p16 

    The article focuses on the use of data encryption by business enterprises to combat data theft and to ensure compliance with a range of legislative and industry mandates. The two types of approaches in considering encryption is the deployment of software-based products and the hardware-based...

  • 10-Step Security. O'Reilly, Dennis // PCWorld;Nov2005, Vol. 23 Issue 11, p119 

    The article offers step-by-step instructions that will help protect computer hardware, software, and data from computer viruses. It outlines examples of computer security software, techniques that can be used to protect your data, and how to use the Windows Security Center.

  • RECENT RELEASES.  // Information Security;Dec2004, Vol. 7 Issue 12, p67 

    Features several computer security products. InterSpect 2.0 from Check Point Software Technologies; MIMEsweeper for SMTP 5.0 from Clearswift; eTrust Security Command Center r8 from Computer Associates.

  • IDS/IPS may offer the perfect partnership for IT security management. Cracknell, Phil // Computer Weekly;8/30/2005, p7 

    The article presents information about the benefits of using mobile adaptive security systems. A common criticism of many operating system suppliers and their history of patching is either that the patches themselves cause new problems, or that they are not developed and released quickly enough...

  • Security goes soft (ware). Hawley, Steve // Telephony;Oct2007 IPTV Supplement, Vol. 248, p24 

    The article focuses on the hardware- and software-based approaches to video content security. It is considered that hardware-based content security adds significant cost to the deployment. The author stresses that content protection systems offer interlocking capabilities such as encryption and...

  • The dangers of zero-day. Ollmann, Gunter // SC Magazine: For IT Security Professionals (UK Edition);Jan2005, p62 

    This article presents measures to protect against zero-day vulnerability in computer systems. By definition, a zero-day vulnerability is a security flaw that the associated software or hardware vendor is either not aware or is currently working on a fix, and no patch or product update is...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics