Figure 6.16 Components of a vulnerability scanner