What do the vocabulary terms mean?
In this article, we'll define some of the most common terms used in Security Center.
- Assets. A network asset is an asset that is considered to be part of a network. For example, an IP address or a network like a /24 range. It may also be a web application asset, such as https://www.yourwebbapplication.com. The assets in Security Center define which IP addresses and web applications you can scan.
- Tags. Use tags to structure your assets and easily manage them. There are two types of tags: Dynamic tags (generated based on the host fingerprint) and static tags (manually set by a user, e.g., Public Network). Dynamic tags can be set with different types of rules. You can apply the dynamic tag to multiple assets based on that rule.
- Network scan. Refers to the function used for network-layer vulnerability assessments, e.g., servers, routers, switches, printers, etc. It can be used to scan anything that you have entered as a network asset.
- Web app scan. Refers to the function used for vulnerability assessments of web applications, i.e., https://www.yourwebbapplication.com. This engine will test the web application, focusing on the HTTP(s) layer and the web technology used. To assess the entire application, we recommend scanning the web application and the web server's IP address using a network scan.
- Scanner Appliance. A virtual machine that can be assigned to run any scan on both networks and web applications. A practical use for a Scanner Appliance is to scan a local network from the inside, behind the firewall, which gives you better insight into your security posture.
- Scan profiles. These settings define what the scan engine will do during the scan. You can have multiple profiles for different purposes. We recommend using our predefined scan profiles, which you can find under Assessments --> Profiles -> Create scan profile, then choose the type of scan you're running (e.g. Network, Policy, Web or Cloud).
- Schedules. The idea behind Security Center is to embed automation into all functions. You can schedule anything from Recurrent scans to generated reports at any time.
- Vulnerabilities. A weakness, flaw, or misconfiguration in software, hardware, or security procedures that can be exploited by a threat actor. These flaws compromise the confidentiality, integrity, or availability of systems, potentially enabling unauthorized access, data theft, or service disruption - and a whole lot of compliance issues.
- Remediation. Within Security Center, remediation refers to the function that generates tickets based on your chosen policies, such as for certain vulnerability levels or specific categories of vulnerabilities. You can also choose the source from which tickets are generated.