This is not a Wikipedia article: It is an individual user's work-in-progress page, and may be incomplete and/or unreliable. For guidance on developing this draft, see Wikipedia:So you made a userspace draft. Find sources: Google (books · news · scholar · free images · WP refs) · FENS · JSTOR · TWL |
Network Vulnerability Scanning refers to a process, primarily supported by software tools, for enumerating the vulnerabilities present on servers and applications within network. Network vulnerability scanning is a subset of the larger process of vulnerability scanning distinguished by its focus on targets attached to a network. While it may seem confusing, network vulnerability scanning commonly includes operating systems, applications, and hardware appliances.