Scanning
When there is a doubt that mitigating controls, such as firewalls, intrusion-detection systems, and file-integrity monitoring, a full penetration test is ideal. Scanning will locate individual vulnerabilities; however, penetration testing will attempt to verify that these vulnerabilities are exploitable within the target environment. Let's have a look into each of the types.
推薦閱讀
- 網(wǎng)絡(luò)安全與管理
- 攻守道:企業(yè)數(shù)字業(yè)務(wù)安全風(fēng)險與防范
- 信息安全導(dǎo)論(在線實驗+在線自測)
- unidbg逆向工程:原理與實踐
- 計算機網(wǎng)絡(luò)安全技術(shù)(第6版·慕課版)
- Learning Python for Forensics
- 特種木馬防御與檢測技術(shù)研究
- 網(wǎng)絡(luò)安全三十六計:人人該懂的防黑客技巧
- 解密彩虹團隊非凡實戰(zhàn)能力:企業(yè)安全體系建設(shè)(共5冊)
- 局域網(wǎng)交換機安全
- 信息安全等級保護測評與整改指導(dǎo)手冊
- 黑客攻防與電腦安全從新手到高手(超值版)
- 隱私保護機器學(xué)習(xí)
- ATT&CK視角下的紅藍對抗實戰(zhàn)指南
- 大數(shù)據(jù)時代的云安全