Browse Definitions :
Definition

unauthenticated security scan (logged-out secuity scan)

Contributor(s): Matthew Haughn

An unauthenticated security scan, sometimes called a logged-out scan, is the process of exploring a network or networked system for vulnerabilities that are accessible without logging in as an authorized user.

Unauthenticated vulnerability scans inspect the security of a target system from an outside perspective. These scans allow visibility into what a malicious hacker could access without acquiring login credentials to pose as a trusted user. Security scans, authenticated or otherwise are an important part of ensuring the security of computer systems, networked devices and networks.

vulnerability scanner runs from the end point of the person inspecting the attack surface in question. The software compares details about the target attack surface to a database of information about known security holes in services and ports, anomalies in packet construction, and potential paths to exploitable programs or scripts

Unauthenticated scans can be performed remotely without requiring much in the way of costs and specialized knowledge. They require less internal cooperation and are less intrusive to the environment than authenticated security scans, which access system resources that are available to trusted uses. 

There are several benefits associated with unauthenticated vulnerability testing:

  1. It's easier.
  2. It requires fewer testing tools.
  3. It requires fewer internal staff resources.
  4. You can still exploit a vulnerability to gain a remote command prompt, etc.
  5. It can often be done without time constraints.

All in all, vulnerability testing from an external point of view tends to be very focused, quickly resulting in a finite set of results with little cost to the organization.

This was last updated in July 2015

Continue Reading About unauthenticated security scan (logged-out secuity scan)

Join the conversation

1 comment

Send me notifications when other members comment.

Please create a username to comment.

Also know as a port scanner, running a port scanner continuously can be a decent alternative, or complement human penetration testing. It can also give a list of open ports for a human to explore.

My experience is that most vulnerability scans that also try to simulate attacks - like nMap - simulate /old/ weaknesses that modern, patched systems should not have.
Cancel

-ADS BY GOOGLE

File Extensions and File Formats

SearchCompliance

  • California Consumer Privacy Act (CCPA)

    The California Consumer Privacy Act (CCPA) is legislation in the state of California that supports an individual's right to ...

  • compliance audit

    A compliance audit is a comprehensive review of an organization's adherence to regulatory guidelines.

  • regulatory compliance

    Regulatory compliance is an organization's adherence to laws, regulations, guidelines and specifications relevant to its business...

SearchSecurity

  • spear phishing

    Spear phishing is an email spoofing attack that targets a specific organization or individual, seeking unauthorized access to ...

  • bridge

    A bridge is a class of network device that’s designed to connect networks at OSI Level 2, which is the data link layer of a ...

  • browser isolation

    Browser isolation is a cybersecurity model for web browsing that can be used to physically separate an internet user’s browsing ...

SearchHealthIT

SearchDisasterRecovery

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

  • business continuity software

    Business continuity software is an application or suite designed to make business continuity planning/business continuity ...

SearchStorage

  • business impact analysis (BIA)

    Business impact analysis (BIA) is a systematic process to determine and evaluate the potential effects of an interruption to ...

  • RAID (redundant array of independent disks)

    RAID (redundant array of independent disks) is a way of storing the same data in different places on multiple hard disks to ...

  • dedicated cloud

    A dedicated cloud is a single-tenant cloud infrastructure, which essentially acts as an isolated, single-tenant public cloud.

Close