Each answer needs to be 150 words minimum.
Explain why vulnerability scans are an important tool in protecting information and providing systems security. Give examples of how such scans are effective in safeguarding information and organizational assets. Identify specific types of information or security problems that vulnerability scans will not address and what other overlapping tools are also needed to fill those gaps.
Research the topic of common vulnerabilities and errors. Look into how vulnerabilities are discovered, reported, shared, and addressed. Consider what types of flaws and weaknesses are adequately addressed by shared information and what flaws exist in this system. Hint: Consider the market in zero-day vulnerabilities and organizations that deal in them.