The prevalence of a particular type of vulnerabilities are constantly changing. In the past few years, organizations have become more attention to information security within the company, forcing the hackers to focus on another type of vulnerabilities – security vulnerabilities in Web applications. Web sites today for many are a goldmine that can not attract the attention of fraudsters and hackers. Therefore, today the majority of attacks are aimed at the identification and exploitation of this vulnerability, available from the outside rather than on-net. To operate the Web sites often need to be open in 1980 port, which is actively and are criminals. Expedia has plenty of information regarding this issue. They seek out weaknesses in information security software server software, and receiving management website, extract information from databases, copy files from my hard disk, or use the server for the victims of spam and malware distribution PO.Skanery vulnerabilities – the conclusion vulnerability scanners are well used as a web application, so and intra-level analysis of information security IT systems. When working with Web applications, the scanner identifies weaknesses in the defense and tries to attack the application, using known vulnerabilities to him in result, the user receives a detailed report about the found "holes" in protecting their systems and a set of recommendations aimed at improving the security of their information assets.
Despite the fact that a scan on identify vulnerabilities – a powerful tool for analyzing security systems by themselves vulnerability scanners do not rectify the information security company. The results of the scan must be correctly interpreted and, based on these results, should be taken adequate measures to protect information assets. Scan should be performed by professionals in the IT field and, in particular in the area information security. Only certified technicians can spend quality scans, the results of which the client will receive clear instructions and an action plan aimed at improving security their information assets. The company's specialists 'IT Security' have huge experience of holding similar events and have the necessary qualifications to carry out scanning does not identify vulnerabilities.