{"id":1459,"date":"2023-01-19T16:13:47","date_gmt":"2023-01-19T16:13:47","guid":{"rendered":"https:\/\/guide.trustvalley.swiss\/chapter\/scannen-von-schwachstellen\/"},"modified":"2023-06-30T10:20:24","modified_gmt":"2023-06-30T10:20:24","slug":"scannen-von-schwachstellen","status":"publish","type":"chapter","link":"https:\/\/guide.trustvalley.swiss\/de\/chapter\/scannen-von-schwachstellen\/","title":{"rendered":"Scannen von Schwachstellen"},"content":{"rendered":"\n<p>Wenn kein menschliches Versagen vorliegt, dann sind Cyberangriffe h\u00e4ufig auf die Ausnutzung einer Software- oder IT-L\u00fccke zur\u00fcckzuf\u00fchren. Daher ist es sinnvoll, Schwachstellenscans durchzuf\u00fchren, um Sicherheitsl\u00fccken, anf\u00e4llige Dienste oder fehlende Updates aufzusp\u00fcren. <\/p>\n\n<p>Schwachstellenscans k\u00f6nnen intern oder extern durchgef\u00fchrt werden.<\/p>\n","protected":false},"featured_media":0,"template":"","categories":[],"searchablecategory":[],"class_list":["post-1459","chapter","type-chapter","status-publish","hentry"],"taxonomy_info":[],"featured_image_src_large":false,"author_info":[],"comment_info":"","_links":{"self":[{"href":"https:\/\/guide.trustvalley.swiss\/de\/wp-json\/wp\/v2\/chapter\/1459","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/guide.trustvalley.swiss\/de\/wp-json\/wp\/v2\/chapter"}],"about":[{"href":"https:\/\/guide.trustvalley.swiss\/de\/wp-json\/wp\/v2\/types\/chapter"}],"wp:attachment":[{"href":"https:\/\/guide.trustvalley.swiss\/de\/wp-json\/wp\/v2\/media?parent=1459"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/guide.trustvalley.swiss\/de\/wp-json\/wp\/v2\/categories?post=1459"},{"taxonomy":"searchablecategory","embeddable":true,"href":"https:\/\/guide.trustvalley.swiss\/de\/wp-json\/wp\/v2\/searchablecategory?post=1459"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}