Phase 2 - Scanning
*
Scanning refers to pre-attack phase when the hacker scans the network with specific information gathered during reconnaissance.
*
Business Risk - 'High' - Hackers have to get a single point of entry to launch an attack and could be point of exploit when vulnerability of the system is detected.
*
Scanning can include use of dialers, port scanners, network mapping, sweeping, vulnerability scanners etc.
*
Scanning refers to pre-attack phase when the hacker scans the network with specific information gathered during reconnaissance.
*
Business Risk - 'High' - Hackers have to get a single point of entry to launch an attack and could be point of exploit when vulnerability of the system is detected.
*
Scanning can include use of dialers, port scanners, network mapping, sweeping, vulnerability scanners etc.
Comments
Post a Comment