Vulnerability Assessment: Passive vs. Active Query
Vulnerability Assessment : Active Scanning vs. Passive Scanning For quite some time, OT engineers and asset owners were horrified by the sound of the “active scan” and quite frankly, they were partially right. No one would dare to scan an OT network the way IT network scans were performed. An active scan could shut down…