Scan That Asset
Static, Dynamic & Everything Between
Context is Key
Infrastructure & Industry
Scanners in the Wild
100

This scanning approach identifies devices by listening quietly on a network without sending packets.

What is passive scanning

100

This type of analysis examines code without running it.

What is static analysis

100

In CVSS, this metric defines whether a vulnerability affects only one component or others as well.

What is scope

100

These industrial systems control physical processes like water treatment or energy distribution.

What are SCADA systems

100

This scanning type can impact network performance due to its intrusive nature.

What is active scanning

200

These two types of scans differ in that one looks at open ports while the other gathers detailed system information.

What are map scans and device fingerprinting

200

This CVSS metric measures how easily a vulnerability can be exploited, considering factors like required privileges and user interaction.

What is Exploitability sub-score

200

This is the term for a vulnerability that is unknown to vendors and unpatched.

What is a zero-day

200

This compliance framework provides security benchmarks for payment card data.

What is PCI DSS

200

This scanning strategy respects network segmentation to avoid disrupting critical zones.

What is scheduled scanning

300

This scanning approach is typically used from inside a network's firewall.

What is internal scanning

300

This method involves feeding unexpected or malformed input into software to identify security flaws.

What is fuzzing

300

CVSS assigns a score based in part on how easy a vulnerability is to exploit—known as this metric.

What is attack complexity

300

This OWASP document lists the ten most critical security risks for web applications

What is the OWASP Top 10

300

Scans originating from outside the firewall are known as this.

What are external scans

400

This kind of scan uses installed software on the target machine to gather detailed data.

What is agent-based scanning

400

This reverse technique starts with compiled software and works backward to analyze its structure.

What is reverse engineering

400

The criticality of a vulnerability is often influenced by this aspect of the asset it affects.

What is asset value

400

This ISO series focuses on information security management standards.

What is ISO 27000

400

This hands-off investment strategy aims to mirror market indexes and often boasts lower fees and less stress for the average investor.

What is passive investing

500

This scanning method operates without needing login credentials or an install to the systems it checks 

What is agentless scanning

500

This scan checks a system against a list of known secure configurations.

What is a security baseline scan

500

This type of scanning evaluates an environment without referencing other systems or networks.

What is isolated context awareness

500

In regulated industries, this term refers to information that must be protected due to legal or business needs.

What is sensitive data

500

This consideration helps balance performance impact with vulnerability coverage during operations.

What is operational segmentation