Vulnerability Scan definition

Vulnerability Scan means an ongoing activity to identify any potential vulnerability in any Authority Assets, the Authority ICT System (or any part thereof) or the Contractor System (or any part thereof).
Vulnerability Scan. Means the process of discovering, and the inspection of, a network and networked systems to identify potential weaknesses which could be exploited.
Vulnerability Scan. An automated process to proactively identify security weaknesses in a network or individual system.

Examples of Vulnerability Scan in a sentence

  • Tenant diligently pursues a course of action that will cure the failure and bring Tenant back into compliance with the Lease within the reasonable additional period (not to exceed 60 days).

  • Amazon will undergo a Penetration Test on Certificate Systems on at least an annual basis and after infrastructure or application upgrades that Amazon determines are significant.Amazon records will be maintained in a manner reasonably sufficient to demonstrate that each Vulnerability Scan and Penetration Test was performed by a person or entity with the skills, tools, proficiency, code of ethics, and independence necessary to provide a reliable Vulnerability Scan or Penetration Test.

  • Managed Information Security Service may consist of one or more of the following Service features as set forth on your applicable Service Order(s): Security Incident and Event Monitoring (“SIEM”); Behavioral Monitoring; Intrusion Detection; Asset Discovery; Incident Detection/Notification; Cybersecurity or other Risk Assessment; Vulnerability Scan, Assessment or Detection; Penetration Testing; Phishing Testing; and/or USM Activity Reporting.

  • EMS receives AntiVirus, Web Filter, Application Firewall, Vulnerability Scan, and Sandbox signatures and engines updates and FortiClient installers from FortiManager and deploys updates to FortiClient while in an air-gapped or isolated network.This feature is also useful if you have experienced hardware failure and need to install EMS on another server.

  • Perform Vulnerability Scan: Perform a vulnerability scan of computers containing LANDESK client agents.

  • You can also enable or disable automatic weekly scans.• Run a WordPress scan to identify vulnerabilities in your WordPress site, plugins, themes and more.• You can run on–demand vulnerability/WordPress scans on the site at anytime.• See Comodo Vulnerability Scan results for more details.• Malware – Run virus scans, view scan results and monitor malware cleanup progress.

  • System Environment‌ • Business Process Diagram • Boundary Description • Boundary Diagram • Network Diagram • Data Flow Diagram • Most Recent Vulnerability Scan Report • Patching and Support Information • Regular Maintenance Window Schedule 3.

  • This monthly report captures the amount of time (as a percentage of the report duration) that the Server and Software runs. Firewall Vulnerability Scan.

  • This paper looks at a variety of areas in order to determine the successes and failures of the mourchidate program as well as discover some of the factors and conditions leading to its creation, and whether it is likely to be implemented in other parts of the global Muslim community.

  • A list of service/support centre should be submitted along with thebidLetter from bidder/OEM with full address details should be produced.


More Definitions of Vulnerability Scan

Vulnerability Scan means the scans set out in item 5 to identify and quantify known vulnerabilities in the IT Environment (which may include misconfigurations, lack of controls, bugs and other security weaknesses), the possibilities of reducing those vulnerabilities and improving the capacity to manage future Cyber Security Threats.

Related to Vulnerability Scan

  • Vulnerability means a weakness of an asset or mitigation that can be exploited by one or more threats.

  • Security Vulnerability means a flaw or weakness in system security procedures, design, implementation, or internal controls that could be exercised (accidentally triggered or intentionally exploited) and result in a security breach such that data is compromised, manipulated or stolen or the system damaged.

  • Vulnerable means a condition in which an adult is unable to protect himself or herself from abuse, neglect, or exploitation because of a mental or physical impairment or because of advanced age.

  • Cathodic protection tester means a person who can demonstrate an understanding of the principles and measurements of all common types of cathodic protection systems as applied to buried or submerged metal piping and tank systems. At a minimum, such persons must have education and experience in soil resistivity, stray current, structure-to-soil potential, and component electrical isolation measurements of buried metal piping and tank systems.

  • COVID-19 Measures means any quarantine, “shelter in place,” “stay at home,” workforce reduction, social distancing, shut down, closure, sequester or any other Law, directive, guidelines or recommendations by any Governmental Authority (including the Centers for Disease Control and the World Health Organization) in each case in connection with, related to or in response to COVID-19, including the Coronavirus Aid, Relief, and Economic Security Act (CARES) or any changes thereto.

  • Wild animals means those species of the class Mammalia whose

  • Vulnerable adult means any person 18 years of age or older who: (1) is a resident or inpatient of a facility; (2) receives services required to be licensed under Minn. Stat. Ch. 245A, except as excluded under Minn. Stat. § 626.5572, Subd. 21(a)(2); (3) receives services from a licensed home care provider or person or organization that offers, provides, or arranges for personal care assistance services under the medical assistance program; or (4) regardless of residence or type of service received possesses a physical or mental infirmity or other physical, mental, or emotional dysfunction that impairs the individual’s ability to adequately provide the person’s own care without assistance or supervision and, because of the dysfunction or infirmity and need for care or services, has an impaired ability to protect the individual’s self from maltreatment.

  • Visibility impairment means any humanly perceptible change in visual range, contrast, or coloration from that which would have existed under natural visibility conditions.

  • Web Site Accessibility Standards/Specifications means standards contained in Title 1 Texas Administrative Code Chapter 206.

  • Subsurface Borings and Testing means borings, probings and subsurface explorations, laboratory tests and inspections of samples, materials and equipment; appropriate professional interpretations of all the foregoing.

  • Severity 3 means the unavailability of an individual resource and automated redundancy is fulfilling demand.

  • Severity means the dollar amount of losses on claims.

  • Target Population means persons with low incomes who have one or more disabilities, including mental illness, HIV or AIDS, substance abuse, or other chronic health condition, or individuals eligible for services provided pursuant to the Lanterman Developmental Disabilities Services Act (Division 4.5 (commencing with Section 4500) of the Welfare and Institutions Code) and may include, among other populations, adults, emancipated minors, families with children, elderly persons, young adults aging out of the foster care system, individuals exiting from institutional settings, veterans, and homeless people.

  • COVID-19 symptoms means fever of 100.4 degrees Fahrenheit or higher, chills, cough, shortness of breath or difficulty breathing, fatigue, muscle or body aches, headache, new loss of taste or smell, sore throat, congestion or runny nose, nausea or vomiting, or diarrhea, unless a licensed health care professional determines the person’s symptoms were caused by a known condition other than COVID-19.

  • Diversity Score means a single number that indicates collateral concentration in terms of both issuer and industry concentration, calculated as set forth on Schedule C hereto.

  • Genetic test means an analysis of human DNA, RNA, chromosomes, proteins, or metabolites, that detect genotypes, mutations, or chromosomal changes. The term “genetic test” does not mean an analysis of proteins or metabolites that does not detect genotypes, mutations, or chromosomal changes; or an analysis of proteins or metabolites that is directly related to a manifested disease, disorder, or pathological condition that could reasonably be detected by a health care professional with appropriate training and expertise in the field of medicine involved.

  • Adverse impact on visibility means visibility impairment which interferes with the management, protection, preservation or enjoyment of the visi- tor’s visual experience of the Federal Class I area. This determination must be made on a case-by-case basis taking into account the geographic extent, in- tensity, duration, frequency and time of visibility impairment, and how these factors correlate with (1) times of vis- itor use of the Federal Class I area, and(2) the frequency and timing of natural conditions that reduce visibility.

  • Genetic testing means an analysis of genetic markers to exclude or identify a man as the father or a woman as the mother of a child. The term includes an analysis of one or a combination of the following:

  • Penetration Testing means security testing in which assessors mimic real-world attacks to identify methods for circumventing the security features of an application, system, or network. (NIST SP 800-115)

  • Category 4 Data is data that is confidential and requires special handling due to statutes or regulations that require especially strict protection of the data and from which especially serious consequences may arise in the event of any compromise of such data. Data classified as Category 4 includes but is not limited to data protected by: the Health Insurance Portability and Accountability Act (HIPAA), Pub. L. 104-191 as amended by the Health Information Technology for Economic and Clinical Health Act of 2009 (HITECH), 45 CFR Parts 160 and 164; the Family Educational Rights and Privacy Act (FERPA), 20 U.S.C. §1232g; 34 CFR Part 99; Internal Revenue Service Publication 1075 (xxxxx://xxx.xxx.xxx/pub/irs-pdf/p1075.pdf); Substance Abuse and Mental Health Services Administration regulations on Confidentiality of Alcohol and Drug Abuse Patient Records, 42 CFR Part 2; and/or Criminal Justice Information Services, 28 CFR Part 20.

  • Technological safeguards means the technology and the policy and procedures for use of the technology to protect and control access to personal information.

  • Wild animal means any mammal, bird, fish, or other creature of a wild nature endowed with sensation and the power of voluntary motion.

  • Archaeological site means a geographic locality in Washington, including but not limited to, submerged and submersible lands and the bed of the sea within the state's jurisdiction, that contains archaeological objects.

  • Web Site Accessibility Standards/Specifications means standards contained in Title 1 Texas Administrative Code Chapter 206.

  • Instantaneous flow measurement means the flow measured during the minimum time required for the flow-measuring device or method to produce a result in that instance. To the extent practical, instantaneous flow measurements coincide with the collection of any grab samples required for the same sampling period so that together the samples and flow are representative of the discharge during that sampling period.

  • Population means the population as ascertained at the last preceding census of which the relevant figures have been published;