Flow of procedures

The activity of a Network Vulnerability Scan can be divided into three phases: