5-types-of-scanning-in-cyber-security