Word of the Day – February 2, 2019
vulnerability scanning
Acronyms
- None
Preferred Term
- None
Definitions
Type | Definition | Sources |
---|---|---|
Noun | An inspection of the potential points of exploit on a computer or network to identify security holes. (used 0 times in citations and controls) | |
Organizational Task | The purpose of this task is to identify weaknesses in systems, services, and devices that could be used by hackers to target an organization's private network. (used 120 times in citations and controls) |
|
Organizational Task | The purpose of this task is to identify security vulnerabilities of computing systems in a network in order to detect areas where a system could potentially be threatened or exploited by hackers attempting to gain unauthorized access. (used 1 times in citations and controls) |
|
Other Forms
Type | Other Form |
---|---|
Plural | vulnerability scannings |
Plural Possessive | vulnerability scannings' |
Possessive | vulnerability scanning's |
Relationships
Common Controls
Displaying Controls in which this term is tagged –
Show all Controls containing this term regardless of tagging
Displaying Controls containing this term –
Show only Controls in which this term is tagged
ID | Control |
---|---|
{{ control.id }} | {{ control.name }} |
None |
Citations
Displaying Citations in which
this term is tagged –
Show all Citations containing this term regardless of tagging
Displaying Citations containing this term –
Show only Citations in which
this term is tagged
AD ID | Authority Document | CT ID | Reference | Guidance | CC ID |
---|---|---|---|---|---|
{{ citation.authority_document.id }} | {{ citation.authority_document.common_name }} | {{ citation.id }} | {{ citation.reference }} | {{ citation.guidance_as_tagged || citation.guidance }} | {{ citation.control.id }} None |
None |