Cargando…

Network Security Assessment : From Vulnerability to Patch.

Solutions Fast Track; Frequently Asked Questions; Chapter 8. Vulnerability Management Tools; Introduction; The Perfect Tool in a Perfect World; Evaluating Vulnerability Management Tools; Commercial Vulnerability Management Tools; Open Source and Free Vulnerability Management Tools; Managed Vulnerabi...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Manzuik, Steve
Otros Autores: Pfeil, Ken, Gold, Andrew
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Rockland : Elsevier Science, 2006.
Temas:
Acceso en línea:Texto completo
Tabla de Contenidos:
  • Front Cover ; Network Security Assessment: From Vulnerability to Patch; Copyright Page ; Contents ; Foreword; Chapter 1. Windows of Vulnerability; Introduction; What Are Vulnerabilities?; Understanding the Risks Posed by Vulnerabilities; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 2. Vulnerability Assessment 101; Introduction; What is a Vulnerability Assessment?; Seeking Out Vulnerabilities; Detecting Vulnerabilities via Security Technologies; The Importance of Seeking Out Vulnerabilities Looking Closer at the Numbers; Summary; Solutions Fast Track.
  • Frequently Asked QuestionsChapter 3. Vulnerability Assessment Tools; Introduction; Features of a Good Vulnerability Assessment Tool; Using a Vulnerability Assessment Tool; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 4. Vulnerability Assessment: Step One; Introduction; Know Your Network; Classifying Your Assets; I Thought This Was a Vulnerability Assessment Chapter; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 5. Vulnerability Assessment: Step Two; Introduction; An Effective Scanning Program; Scanning Your Network; When to Scan; Summary.
  • Solutions Fast TrackFrequently Asked Questions; Chapter 6. Going Further; Introduction; Types of Penetration Tests; Scenario: An Internal Network Attack; Penetration Testing; Vulnerability Assessment versus a Penetration Test; Internal versus External; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 7. Vulnerability Management; Introduction; The Vulnerability Management Plan; The Six Stages of Vulnerability Management; Governance (What the Auditors Want to Know); Measuring the Performance of a Vulnerability Management Program; Common Problems with Vulnerability Management.
  • Solutions Fast TrackFrequently Asked Questions; Chapter 10. Regulatory Compliance; Introduction; Regulating Assessments and Pen Tests; Drafting an Information Security Program; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 11. Tying It All Together; Introduction; A Vulnerability Management Methodology; Step One: Know Your Assets; Step Two: Categorize Your Assets; Step Three: Create a Baseline Scan of Assets; Step Four: Perform a Penetration Test on Certain Assets; Step Five: Remediate Vulnerabilities and Risk; Step Six: Create a Vulnerability Assessment Schedule.