Security Administrator Tool for Analyzing Networks information
Vulnerability scanner for networks
"SATAN" redirects here. For the religious concept, see Satan. For other uses, see Satan (disambiguation).
SATAN
Original author(s)
Dan Farmer and Wietse Venema
Written in
Perl, Shell scripts
Operating system
Unix
Size
767k, uncompressed
Available in
English
Type
Security software
Website
www.porcupine.org/satan/
Security Administrator Tool for Analyzing Networks (SATAN) was a free software vulnerability scanner for analyzing networked computers. SATAN captured the attention of a broad technical audience, appearing in PC Magazine[1] and drawing threats from the United States Department of Justice.[1] It featured a web interface, complete with forms to enter targets, tables to display results, and context-sensitive tutorials that appeared when a vulnerability had been found.
^ abTabibian, O. Ryan (April 23, 1996). "Internet Scanner Finds Security Holes". PC Magazine. Ziff Davis, Inc.
and 21 Related for: Security Administrator Tool for Analyzing Networks information
developed a second vulnerability scanner called the SecurityAdministratorToolforAnalyzingNetworks (SATAN). Due to a misunderstanding of SATAN's capabilities...
digital security operations. SOAR enables administrators to handle security alerts without the need for manual intervention. When the networktool detects...
network or systems for malicious activity or policy violations. Any intrusion activity or violation is typically either reported to an administrator or...
criminal basis. List of security assessment tools Kali SecurityAdministratorToolforAnalyzingNetworks Nessus (software) Vulnerability scanner Nessus Attack...
generally responsible for the security of computer systems. A system administrator's responsibilities might include: Analyzing system logs and identifying...
Computer security, cybersecurity, digital security or information technology security (IT security) is the protection of computer systems and networks from...
and other wireless devices to corporate networks creates attack paths forsecurity threats. Endpoint security attempts to ensure that such devices follow...
Wireless security is the prevention of unauthorized access or damage to computers or data using wireless networks, which include Wi-Fi networks. The term...
ability to collect IP network traffic as it enters or exits an interface. By analyzing the data provided by NetFlow, a networkadministrator can determine things...
network device or software for controlling networksecurity and access rules. Firewalls are inserted in connections between secure internal networks and...
information security has grown and evolved significantly in recent years. It offers many areas for specialization, including securing networks and allied...
Security event management (SEM), and the related SIM and SIEM, are computer security disciplines that use data inspection tools to centralize the storage...
database, compromise the system etc. Database administrators or information securityadministrators may for example use automated vulnerability scans to...
system, integrating a selection of tools designed to aid networkadministrators in computer security, intrusion detection and prevention. The project began...
successors are designed forsecurity (including on a network) and multi-user PCs, they were not initially designed with Internet security in mind as much, since...
Management Network model and framework fornetwork management. FCAPS is an acronym for fault, configuration, accounting, performance, security, the management...