A vulnerability scanner is a tool that scans a network or a system for known vulnerabilities, such as misconfigurations, outdated software, or weak passwords. A vulnerability scanner can provide valuable information for improving the security posture of a system, but it can also cause serious disruption of a control network if used on a live system. This is because a vulnerability scanner may generate a large amount of network traffic, consume system resources, trigger alarms, or even crash devices by exploiting vulnerabilities. Therefore, a vulnerability scanner should not be used on a live system without proper authorization and precautions. A vulnerability scanner should only be used on a test or isolated network, or during a scheduled maintenance window with minimal impact on the system operation. References: ISA/IEC 62443 Standards to Secure Your Industrial Control System, Module 5: Assessing the Current Security Level, Slide 25.
Contribute your Thoughts:
Chosen Answer:
This is a voting comment (?). You can switch to a simple comment. It is better to Upvote an existing comment if you don't have anything to add.
Submit