A tool used in the reconnaissance stage of an attack. The attacker scans an IP to discover if any vulnerable ports are open that are more prone to exploitation.
Cyber Essentials Scheme Cyber Resilience Cyber Risk Firewall & Network Security Industry & Updates Phishing & Security Awareness Training Technical Vulnerability Management