exeCution, rePorting, and analysis 233
higher vulnerability scores, possibly from greater complexity. In many
cases, such a pattern is due to an engineering or security staff that was
ill-prepared for the net assets. An examination of the remediation effort
and the specific vulnerabilities affecting the host is in order.
7.6 Active Scanning: Scheduling and Resources
When using active scanners either with agents or appliances, the pro-
cess of scheduling and resource management can be critical. When
an active scan of a network segment is performed, as previously dis-
cussed, there are impacts on networks, targets, various infrastructure
components, and possibly, by extension, business operations. In order
to properly manage these factors, a cer ...