• Skip to primary navigation
  • Skip to main content
  • Skip to footer

  • Compliance
    • CMMC/NIST 800-171 Virtual Classroom
    • Consulting
    • Compliance Software
  • Consulting
    • Cyber Risk Assessment
    • Security Controls Assessment
    • Supply Chain Security
    • Cybersecurity Policy Development
      • System Security Plan
      • Plan of Action and Milestones
      • Acceptable Use Policy
      • Incident Response Plan
    • ICS/SCADA Services
    • Penetration Testing
    • Vulnerability Scanning
  • Industries
    • DoD Contractors
    • Health Care (HIPAA)
    • Higher Education
    • Utilities/Critical Infrastructure
    • Local and Federal Government
  • Trainings
    • CMMC / NIST 800-171 Virtual Classroom
    • Totem Town Hall
    • DFARS Cybersecurity E-Book
    • Cybersecurity Awareness
    • IT Administrators
    • Resources
      • Acronyms
      • Glossary
  • Pricing
  • About
    • Team
    • Partners
    • Clients
    • Careers
  • Blog
  • Contact
Request a Quote

Vulnerability Scan

You are here: Home / Glossary / Vulnerability Scan

April 1, 2021 by Zoie Schiermeyer

A vulnerability scan is an inspection of a computer workstation, server, or network to identify susceptible points of exploit or security holes. A vulnerability scan detects and categorizes IT infrastructure weaknesses through use of automated and manual scanning tools such as Assured Compliance Assessment Solution (ACAS) and the DoD Information Systems Agency (DISA) Security Technical Implementation Guides (STIGs). A vulnerability scan can be performed by an organization’s IT department or a third-party cybersecurity service provider. Vulnerability scans are wide scope in nature and are focused primarily to identify potential weaknesses by identifying missing patches and unsafe system configuration such as registry, and group policy settings. Vulnerability scanning is ongoing cycle of continuous system inspections and not a single event.

Footer

Totem Cybersecurity

Simplifying your cybersecurity through consulting, compliance training, cybersecurity compliance software, and other cybersecurity services.

(855) 405-4075

[email protected]

Cybersecurity Services

  • Consulting
  • Cybersecurity Training
  • Compliance Software
  • Industries Served
  • Pricing

Cybersecurity Compliance

  • DoD Contractors
  • CMMC
  • NIST 800 171
  • HIPAA Security Rule
  • Colleges and Universities

Newsletter

Copyright © 2021  Haight Bey & Associates LLC DBA Totem Technologies. All rights reserved. Return to top

Cybersecurity Compliance from Totem