vulnerability scan

Acronyms

  • None

Preferred Term

  • None

Non-standard Terms

Definitions

Type Definition Sources
Asset An automated tool that checks a system vulnerabilities by reviewing networks and Web applications based on the external-facing Internet Protocol (IP) addresses. The tool identifies vulnerabilities in systems, services, and devices that could be used by hackers to target the organization's private network. (used 0 times in citations and controls)
  • Per ISO 704:2009 methodology
Noun The check of a system for known vulnerabilities from beginning to end with resultant errors, and status information. (used 145 times in citations and controls)
  • Per ISO 704:2009 methodology

Other Forms

Type Other Form
Plural vulnerability scans
Plural Possessive vulnerability scans'
Possessive vulnerability scan's

Relationships

Loading...

Common Controls

Displaying Controls in which this term is tagged – Show all Controls containing this term regardless of tagging
Displaying Controls containing this term – Show only Controls in which this term is tagged
Loading...
ID Control
{{ control.id }} {{ control.name }}
None

Citations

Displaying Citations in which this term is tagged – Show all Citations containing this term regardless of tagging
Displaying Citations containing this term – Show only Citations in which this term is tagged
Loading...
AD ID Authority Document CT ID Reference Guidance CC ID
{{ citation.authority_document.id }} {{ citation.authority_document.common_name }} {{ citation.id }} {{ citation.reference }} {{ citation.guidance_as_tagged || citation.guidance }} {{ citation.control.id }} None
None