Vulnerability Scan definition

Vulnerability Scan means an ongoing activity to identify any potential vulnerability in any Authority Assets, the Authority’s Systems Environment (or any part thereof) or the Contractor’s Systems Environment (or any part thereof).
Vulnerability Scan means the scans set out in item 5 to identify and quantify known vulnerabilities in the IT Environment (which may include misconfigurations, lack of controls, bugs and other security weaknesses), the possibilities of reducing those vulnerabilities and improving the capacity to manage future Cyber Security Threats.
Vulnerability Scan. An automated process to proactively identify security weaknesses in a network or individual system.

Examples of Vulnerability Scan in a sentence

  • Managed Information Security Service may consist of one or more of the following Service features as set forth on your applicable Service Order(s): Security Incident and Event Monitoring (“SIEM”); Behavioral Monitoring; Intrusion Detection; Asset Discovery; Incident Detection/Notification; Cybersecurity or other Risk Assessment; Vulnerability Scan, Assessment or Detection; Penetration Testing; Phishing Testing; and/or USM Activity Reporting.

  • PCI DSS External Vulnerability Scan Outbound call* made by Elavon to configure the scan with customer and walk through SAQ The purpose of this scan is to identify if there are vulnerable entry points to your business network by scanning all possible points of entry.

  • Document Description Submission Requirements Entity Responsible Deadline Vulnerability Scan ▪ A Prospective EDE Entity is required to conduct monthly Vulnerability Scans.

  • Perform Vulnerability Scan: Perform a vulnerability scan of computers containing LANDESK client agents.

  • In addition, Customer’s Initial Vulnerability Scan shall include _x_ hours of assistance to identify remediation steps to address vulnerabilities identified in the initial scan performed on Customer’s Computer System, which Customer shall be required to use within ten (10) business days of receiving the initial SAR or shall forfeit such remediation assistance.

  • To assist our Clients with their compliance efforts, Client may provide Vulnerability Scan Reports to Developer and Developer will mitigate any highlighted issues under Developer’s or Hosting Provider’s reasonable control to fix.

  • Vulnerability Vulnerability Scans and Vulnerability Scan reporting shall be performed at minimum as defined by regulatory needs.

  • Customer Deliverables The following deliverables shall be securely provided to Customer: Deliverable Description Expected Timeframes Execution of the Internal Vulnerability Scan and the External Vulnerability Scan Vodafone shall perform the Internal Vulnerability Scan and the External Vulnerability Scan on the Customer’s Environment.

  • To the extent Company has supplied any equipment for use during any Study; such equipment shall be properly maintained by University throughout the conduct of the Study and kept in good operating condition, reasonable wear and tear expected.

  • Payment is due at the time of service for the Initial Vulnerability Scan.


More Definitions of Vulnerability Scan

Vulnerability Scan means an ongoing activity to identify any

Related to Vulnerability Scan

  • Vulnerability means a weakness of an asset or mitigation that can be exploited by one or more threats.

  • Security Vulnerability means a flaw or weakness in system security procedures, design, implementation, or internal controls that could be exercised (accidentally triggered or intentionally exploited) and result in a security breach such that data is compromised, manipulated or stolen or the system damaged.

  • Vulnerable means a condition in which an adult is unable to protect himself or herself from abuse, neglect, or exploitation because of a mental or physical impairment or because of advanced age.

  • Cathodic protection tester means a person who can demonstrate an understanding of the principles and measurements of all common types of cathodic protection systems as applied to buried or submerged metal piping and tank systems. At a minimum, such persons must have education and experience in soil resistivity, stray current, structure-to-soil potential, and component electrical isolation measurements of buried metal piping and tank systems.