A technique used to identify hosts/host attributes and associated vulnerabilities. -NIST.gov