The activity of a Network Vulnerability Scan can be divided into three phases: Discovery Port scanning Vulnerability scanning