vulnerability scan
Definitions
Type | Definition | Sources |
---|---|---|
Asset | An automated tool that checks a system vulnerabilities by reviewing networks and Web applications based on the external-facing Internet Protocol (IP) addresses. The tool identifies vulnerabilities in systems, services, and devices that could be used by hackers to target the organization's private network. (used 0 times in citations and controls) |
|
Noun | The check of a system for known vulnerabilities from beginning to end with resultant errors, and status information. (used 145 times in citations and controls) |
|
Other Forms
Type | Other Form |
---|---|
Plural | vulnerability scans |
Plural Possessive | vulnerability scans' |
Possessive | vulnerability scan's |
Relationships
Common Controls
Displaying Controls in which this term is tagged –
Show all Controls containing this term regardless of tagging
Displaying Controls containing this term –
Show only Controls in which this term is tagged
ID | Control |
---|---|
{{ control.id }} | {{ control.name }} |
None |
Citations
Displaying Citations in which
this term is tagged –
Show all Citations containing this term regardless of tagging
Displaying Citations containing this term –
Show only Citations in which
this term is tagged
AD ID | Authority Document | CT ID | Reference | Guidance | CC ID |
---|---|---|---|---|---|
{{ citation.authority_document.id }} | {{ citation.authority_document.common_name }} | {{ citation.id }} | {{ citation.reference }} | {{ citation.guidance_as_tagged || citation.guidance }} | {{ citation.control.id }} None |
None |