Vulnerability checks are critical for network security. If you are not familiar with the concept, the openings are weak or in-line network perimeter, where the criminals can access the system. Businesses, in particular, it can be devastating. The third, the system can be one or more vulnerabilities to spread malware to steal passwords or corrupt files data and identity theft, litigation, and can evaluate the results of customer dissatisfaction. To determine sensitivity or CT, the first of the hosts and their attributes to the network, including operating systems, applications and problems. These problems are the basis for identifying vulnerabilities. The software is no longer at the level of this part of the hole in the software patch or configuration current, or incomplete. Applications and operating systems has to check the computer a list of known vulnerabilities in the database the scanner, and if these points have been identified, the world of entertainment ethics hacking.A the vulnerabilities in the network and the external circuit, and both are important. The internal audit is often vulnerable and external analysis to identify weaknesses in the ring. Should the security can access other at the gate, and to do some research, the team is able to use the gates or security through.A celebrates the company’s network is able to scan a network in your home or office. Vulnerability control at home or at the local, more often, and take advantage of the vulnerabilities. After scanning, report the problems of network security firm to draw conclusions and proposals to address solutions. Vulnerability checks for all businesses and organizations that use electronic systems to require information about the company or customers to save. In many cases, the best practices in the field for such companies and organizations calling on regular vulnerability scans run to meet you. The Federal Financial Institutions Examination Council (FFIEC) IT Handbook, such lack of control of a single business continuity. Overall, the economy, which are used to evaluate the risk-management with industry and corporate business policies.Necessary and store all electronic media, susceptibility testing, identification of a risk position on the promotion of confidentiality, integrity and availability of information to To demonstrate the effectiveness of the design process to assess the management and operation and implementation of information technology. In addition, the FFIEC IT Handbook, the Sarbanes-Oxley Act, also known as the reform of accounting and protection of the population in 2002, part of the audit of the financial sector announced. § 404 provides that to prevent the department sufficient security against fraud, abuse and loss of data or cash flow is a means for early diagnosis and effective must be able to identify exceptions and take appropriate action, and must be within the scope of SOX 404, regular audits will be tested .