Asset: A physical or virtual device or component within an information technology system, identified by a unique asset ID.
Authentication: A scanning tool’s ability to log in with administrative privileges on an asset in order to perform a scan with elevated privileges.
Authorization: A scanning tool’s ability to access the registry and files on an asset remotely in order to perform a full scan.
Detection: An individual program within the scanning tool that checks for a given vulnerability or other data point (authentication, etc.) that is flagged as a finding, identified by a unique detection ID.
Vulnerability: A scan detection that relates to a specific weakness, identified by a unique vulnerability ID.