Views:
Attackers generally look for vulnerabilities in a network. They try to find the weak points in a network security system to bypass filters and reach data and services. These attackers seek to use intrusion methods against areas such as software back-doors and poorly protected hosts and ports. Vulnerability scanning checks for all potential methods that an attacker could use to infiltrate a network and system.
Vulnerability filters protect these possible points of entry in a network, detecting and blocking attempted intrusions. The filters constantly scan for possible intrusion points, giving a warning when a vulnerability is found or when malicious attacks occur.