Attackers generally look for vulnerabilities in a network. They try to find the
weak points in a network security system to bypass filters and reach data and services.
These
attackers seek to use intrusion methods against areas such as software back-doors
and poorly
protected hosts and ports. Vulnerability scanning checks for all potential methods
that an
attacker could use to infiltrate a network and system.
Vulnerability filters protect these possible points of entry in a network, detecting
and
blocking attempted intrusions. The filters constantly scan for possible intrusion
points,
giving a warning when a vulnerability is found or when malicious attacks occur.