PresNCKSLXMZ,XX,ODDKLCMCZ,CM,C,Centation 13.pptx

Sakthivel922107 11 views 8 slides Mar 09, 2025
Slide 1
Slide 1 of 8
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8

About This Presentation

JDKZ


Slide Content

Vulnerability scanning

What is vulnerability ?

Vulnerability is the weakness in the security system . A particular system may be vulnerable to unauthorized data manipulation, Because the system does not verify a user identity before allowing data access.

Example

VULNERABILITY SCANNING A vulnerability scanner enables organization to moniter their network systems, and applications for security vulnerability.

Types Missing data encryption OS command injection SQL injection Buffer overflow Missing authentication for critical function Missing authorization

Tools Open VAS Nmap Niktoz Acunetix

Network Scanning Network Scanning refers to the process of obtaining additional information and performing a more detailed reconnaissance based on the collected information in the footprinting phase.
Tags