Compliance Glossary

Welcome to our list of commonly used security and compliance terms.

A vulnerability scan is a type of automated security assessment that checks a computer system or network for known security weaknesses and vulnerabilities. Vulnerability scans are typically conducted using specialized software tools that scan the system or network for vulnerabilities based on a database of known vulnerabilities and weaknesses.

During a vulnerability scan, the software tool will identify open ports, applications, and services running on the system or network, and compare this information with a database of known vulnerabilities and exploits. The tool will then generate a report that identifies any vulnerabilities and suggests steps to remediate them.

Vulnerability scans can be performed on a regular basis to identify new vulnerabilities that may have emerged since the previous scan. They can be useful for identifying security weaknesses before they are exploited by attackers, and for ensuring compliance with industry regulations and standards.

It's important to note that vulnerability scans are not comprehensive security assessments, and they should be used in conjunction with other security measures, such as penetration testing and risk assessments. Additionally, vulnerability scans should be performed by qualified professionals who can properly interpret the results and take appropriate action to remediate any vulnerabilities that are identified.


Recommended reading

Vulnerability Scanning vs Penetration Testing: Which Security Assessment Do You Need?

Read more

Join the thousands of companies using Secureframe