Scanning
For the UH System, scanning is done by authorized UHS Informatin Security personnel to identify computer resources which are or might be vulnerable to hackers.
Request Scanning Services
Anyone requiring vulnerability or web application scanning should email security@uh.edu, or call (832) 842-4695.
Types of Scanning Services
Vulnerability Scanning
Vulnerability scanning is a computer program designed to assess computers, computer systems, networks or applications to determine if a computer is vulnerable to certain over-the-network attack methods. This can be carried out on both wired and wireless networks.
Web Application Security Scanning
Websites are most vulnerable to attacks from hackers. Websites that contain applications like carts, forms, login pages, and dynamic content are prone to attacks. Web applications are generally deployed on port 80, which has to remain open and hence provides no protection. Some of the examples of web vulnerabilities are:
- SQL injection
- Cross Site Scripting (XSS)
- Remote Code execution
- Format String Vulnerabilities
- Username Enumeration