The purpose of vulnerability assessments is to prevent the possibility of unauthorized access to systems.
Vulnerability testing preserves the confidentiality, integrity, and availability of the system.
Types of Vulnerability Scanners
Vulnerability scanners have their ways of doing jobs. We can classify the vulnerability scanners into four types based on how they operate.
Cloud-Based Vulnerability Scanners
Used to find vulnerabilities within cloud-based systems such as web applications, WordPress, and Joomla.
Host-Based Vulnerability Scanners
Used to find vulnerabilities on a single host or system such as an individual computer or a network device like a switch
Network-Based Vulnerability Scanners
Used to find vulnerabilities in an internal network by scanning for open ports.
Database-Based Vulnerability Scanners
Used to find vulnerabilities in database management systems.
Some of the tools to name include:
Retina CS Community
Solarwinds Network configuration manager