uhs-wordmark

Scanning

For the UH System, scanning is done by authorized UHS Informatin Security personnel to identify computer resources which are or might be vulnerable to hackers.

Request Scanning Services

Anyone requiring vulnerability or web application scanning should email security@uh.edu, or call (832) 842-4695.

Types of Scanning Services

Vulnerability Scanning

Vulnerability scanning is a computer program designed to assess computers, computer systems, networks or applications to determine if a computer is vulnerable to certain over-the-network attack methods. This can be carried out on both wired and wireless networks.

Web Application Security Scanning

Websites are most vulnerable to attacks from hackers. Websites that contain applications like carts, forms, login pages, and dynamic content are prone to attacks. Web applications are generally deployed on port 80, which has to remain open and hence provides no protection. Some of the examples of web vulnerabilities are:

  1. SQL injection
  2. Cross Site Scripting (XSS)
  3. Remote Code execution
  4. Format String Vulnerabilities
  5. Username Enumeration