TITLE

Vulnerability Scanning

PUB. DATE
March 2007
SOURCE
Network Dictionary;2007, p520
SOURCE TYPE
Book
DOC. TYPE
Reference Entry
ABSTRACT
An encyclopedia entry for "Vulnerability Scanning" in computer security is presented. It refers to the process of using some software or hardware tools to identify vulnerabilities of computing systems in a network in order to determine if and where a system can be exploited and/or threatened. The security flaws that a vulnerability scanner can seek is based on a database of known flaws.
ACCESSION #
31671201

 

Related Articles

  • XFire helps pinpoint Web application bugs. Powell, Thomas // Network World;8/2/2004, Vol. 21 Issue 31, p36 

    Modern Web applications are a conglomerate of many individual moving parts. Web server software and hardware, application servers, database systems, custom developed applications, a variety of network devices, the network transport and, of course, the ever-present Web browser all present...

  • Information Leakage.  // Network Dictionary;2007, p244 

    A definition of the term "Information Leakage," in relation to computer security, is presented. It refers to obtaining useful information through vulnerabilities in hardware or software.

  • Vulnerability Scanner.  // Network Dictionary;2007, p520 

    An encyclopedia entry for "Vulnerability Scanner" in computer security is presented. It refers to a type of computer program specifically designed to search a given software or hardware system for security weaknesses. There are two ways by which the program can be used, either prophylactically...

  • IDS/IPS may offer the perfect partnership for IT security management. Cracknell, Phil // Computer Weekly;8/30/2005, p7 

    The article presents information about the benefits of using mobile adaptive security systems. A common criticism of many operating system suppliers and their history of patching is either that the patches themselves cause new problems, or that they are not developed and released quickly enough...

  • Security goes soft (ware). Hawley, Steve // Telephony;Oct2007 IPTV Supplement, Vol. 248, p24 

    The article focuses on the hardware- and software-based approaches to video content security. It is considered that hardware-based content security adds significant cost to the deployment. The author stresses that content protection systems offer interlocking capabilities such as encryption and...

  • The dangers of zero-day. Ollmann, Gunter // SC Magazine: For IT Security Professionals (UK Edition);Jan2005, p62 

    This article presents measures to protect against zero-day vulnerability in computer systems. By definition, a zero-day vulnerability is a security flaw that the associated software or hardware vendor is either not aware or is currently working on a fix, and no patch or product update is...

  • 10-Step Security. O'Reilly, Dennis // PCWorld;Nov2005, Vol. 23 Issue 11, p119 

    The article offers step-by-step instructions that will help protect computer hardware, software, and data from computer viruses. It outlines examples of computer security software, techniques that can be used to protect your data, and how to use the Windows Security Center.

  • Hardware versus Software Approaches to Encrypting Data for Security. Toubbe, Karim // Database Trends & Applications;Dec2005, Vol. 19 Issue 12, p16 

    The article focuses on the use of data encryption by business enterprises to combat data theft and to ensure compliance with a range of legislative and industry mandates. The two types of approaches in considering encryption is the deployment of software-based products and the hardware-based...

  • Using ambients to control resources. Teller, David; Zimmer, Pascal; Hirschkoff, Daniel // International Journal of Information Security;2004, Vol. 2 Issue 3/4, p126 

    Current software and hardware systems, being parallel and reconfigurable, raise new safety and reliability problems, and the resolution of these problems requires new methods. Numerous proposals aim at reducing the threat of bugs and preventing several kinds of attacks. In this paper, we develop...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics