Browse Definitions :
Definition

unauthenticated security scan (logged-out secuity scan)

An unauthenticated security scan, sometimes called a logged-out scan, is the process of exploring a network or networked system for vulnerabilities that are accessible without logging in as an authorized user.

Unauthenticated vulnerability scans inspect the security of a target system from an outside perspective. These scans allow visibility into what a malicious hacker could access without acquiring login credentials to pose as a trusted user. Security scans, authenticated or otherwise are an important part of ensuring the security of computer systems, networked devices and networks.

A vulnerability scanner runs from the end point of the person inspecting the attack surface in question. The software compares details about the target attack surface to a database of information about known security holes in services and ports, anomalies in packet construction, and potential paths to exploitable programs or scripts

Unauthenticated scans can be performed remotely without requiring much in the way of costs and specialized knowledge. They require less internal cooperation and are less intrusive to the environment than authenticated security scans, which access system resources that are available to trusted uses. 

There are several benefits associated with unauthenticated vulnerability testing:

  1. It's easier.
  2. It requires fewer testing tools.
  3. It requires fewer internal staff resources.
  4. You can still exploit a vulnerability to gain a remote command prompt, etc.
  5. It can often be done without time constraints.

All in all, vulnerability testing from an external point of view tends to be very focused, quickly resulting in a finite set of results with little cost to the organization.

This was last updated in July 2015

Continue Reading About unauthenticated security scan (logged-out secuity scan)

SearchNetworking
  • network packet

    A network packet is a basic unit of data that's grouped together and transferred over a computer network, typically a ...

  • virtual network functions (VNFs)

    Virtual network functions (VNFs) are virtualized tasks formerly carried out by proprietary, dedicated hardware.

  • network functions virtualization (NFV)

    Network functions virtualization (NFV) is a network architecture model designed to virtualize network services that have ...

SearchSecurity
  • MICR (magnetic ink character recognition)

    MICR (magnetic ink character recognition) is a technology invented in the 1950s that's used to verify the legitimacy or ...

  • What is cybersecurity?

    Cybersecurity is the protection of internet-connected systems such as hardware, software and data from cyberthreats.

  • Android System WebView

    Android System WebView is a system component for the Android operating system (OS) that allows Android apps to display web ...

SearchCIO
  • privacy compliance

    Privacy compliance is a company's accordance with established personal information protection guidelines, specifications or ...

  • contingent workforce

    A contingent workforce is a labor pool whose members are hired by an organization on an on-demand basis.

  • product development (new product development -- NPD)

    Product development, also called new product management, is a series of steps that includes the conceptualization, design, ...

SearchHRSoftware
  • talent acquisition

    Talent acquisition is the strategic process employers use to analyze their long-term talent needs in the context of business ...

  • employee retention

    Employee retention is the organizational goal of keeping productive and talented workers and reducing turnover by fostering a ...

  • hybrid work model

    A hybrid work model is a workforce structure that includes employees who work remotely and those who work on site, in a company's...

SearchCustomerExperience
  • Salesforce Trailhead

    Salesforce Trailhead is a series of online tutorials that coach beginner and intermediate developers who need to learn how to ...

  • Salesforce

    Salesforce, Inc. is a cloud computing and social enterprise software-as-a-service (SaaS) provider based in San Francisco.

  • data clean room

    A data clean room is a technology service that helps content platforms keep first person user data private when interacting with ...

Close