top of page
Reflection
Just as a doctor uses MRI (Magnetic Resonance Imaging) to get detailed pictures inside a person’s body such as brain scan to look for blood vessel damage, brain injury, cancer, or MRI scan of the heart and blood vessels to look for signs of blocked blood vessels, heart disease, security professionals can use network visualization and vulnerability detection tools to look for activity taking place in the network, unauthorized applications, outdated application versions, unauthorized transfer of files, map out hosts, fingerprint the services, open ports, vulnerable security protocols. These tools can be used to perform security auditing, compliance testing, penetration testing to harden the system.
bottom of page