Analysis should include detection of vulnerabilities when using
- port scanning (i.e., Network Mapper [Nmap])
- software update services
- baseline creation
- industry standard vulnerability scanning assessments, such as Nessus
- other tools, such as Microsoft Baseline Security Analyzer (MBSA)
- normal network traffic
- malicious network traffic (i.e., ARP poisoning, teardrop attack, SMURF attack).