Scanning & Scrutinizing

in cyber •  last year 

Hello people!

scan-3924343_1280.jpg

Let us learn about scanning and scrutinizing.

=> Scanning and scrutinising that we important steps in cyber security that helps to identify an investigate the targets system in network.

face-detection-4791810_1280.jpg

Scanning :

  • Scanning is a process checking a computer system or network system quickly and gathering vague information on the target.

  • Scanning is used to find out the information, such as, IP address, operating system, Softwares, etc.

  • Scanning involves using various tools and methods to examine the targets infrastructure and networks.

  • Scanning is useful for both honest hackers and wicked hackers, depending on their intentions and goals.

  • Scanning is used by good hackers to test the security system of network for safeguarding.
    It is also used by harmful hackers to find weakness of the system or the network for their benifit.

virtual-identity-69996_1280.jpg

Scrutinizing :

  • Scrutinizing is a process of observing and investigating in details information on the system or network of the target.

  • Scrutinizing is used us to find out information, such as, user account, network and system detailed configuration, etc.

  • Scrutinizing involves using methods such as observation, analysis, seeking evidence about the target.

  • Scrutinizing also is useful for both good and corrupt hackers, depending on their purpose or intentions.

  • Scrutinizing is used for different purposes, for learning, understanding, solving problems, etc.
    It is also used for purpose detecting and exploiting the weakness of the target for benifit.

Authors get paid when people like you upvote their post.
If you enjoyed what you read here, create your account today and start earning FREE BLURT!