Cargando…

Network vulnerability assessment : identify security loopholes in your network's infrastructure /

Exercises; Chapter 2: Setting Up the Assessment Environment; Setting up a Kali virtual machine; Basics of Kali Linux; Environment configuration and setup; Web server; Secure Shell (SSH); File Transfer Protocol (FTP); Software management; List of tools to be used during assessment; Summary; Chapter 3...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Rahalkar, Sagar (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Birmingham, UK : Packt Publishing, 2018.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000 i 4500
001 OR_on1055555635
003 OCoLC
005 20231017213018.0
006 m o d
007 cr unu||||||||
008 181003s2018 enka o 000 0 eng d
040 |a UMI  |b eng  |e rda  |e pn  |c UMI  |d N$T  |d TEFOD  |d N$T  |d TOH  |d CEF  |d G3B  |d STF  |d UAB  |d YDX  |d OCLCQ  |d OCLCO  |d KSU  |d OCLCQ 
019 |a 1099994200 
020 |a 9781788624725  |q (electronic bk.) 
020 |a 1788624726  |q (electronic bk.) 
020 |z 9781788627252 
029 1 |a AU@  |b 000065657349 
035 |a (OCoLC)1055555635  |z (OCoLC)1099994200 
037 |a CL0500000995  |b Safari Books Online 
037 |a B13C9F25-6435-4878-849E-243BB03BD264  |b OverDrive, Inc.  |n http://www.overdrive.com 
050 4 |a TK5105.59 
072 7 |a COM  |x 000000  |2 bisacsh 
082 0 4 |a 005.8  |2 23 
049 |a UAMI 
100 1 |a Rahalkar, Sagar,  |e author. 
245 1 0 |a Network vulnerability assessment :  |b identify security loopholes in your network's infrastructure /  |c Sagar Rahalkar. 
264 1 |a Birmingham, UK :  |b Packt Publishing,  |c 2018. 
300 |a 1 online resource (1 volume) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
588 0 |a Online resource; title from title page (Safari, viewed October 1, 2018). 
505 0 |a Cover; Title Page; Copyright and Credits; Packt Upsell; Contributors; Table of Contents; Preface; Chapter 1: Vulnerability Management Governance; Security basics; The CIA triad; Confidentiality ; Integrity; Availability; Identification; Authentication; Authorization; Auditing ; Accounting ; Non-repudiation ; Vulnerability ; Threats ; Exposure ; Risk ; Safeguards ; Attack vectors ; Understanding the need for security assessments; Types of security tests; Security testing; Vulnerability assessment versus penetration testing; Security assessment; Security audit 
505 8 |a Business drivers for vulnerability managementRegulatory compliance; Satisfying customer demands; Response to some fraud/incident; Gaining a competitive edge; Safeguarding/protecting critical infrastructures; Calculating ROIs; Setting up the context; Bottom-up; Top-down; Policy versus procedure versus standard versus guideline; Vulnerability assessment policy template; Penetration testing standards; Penetration testing lifecycle; Industry standards; Open Web Application Security Project testing guide; Benefits of the framework; Penetration testing execution standard; Benefits of the framework 
505 8 |a Types of vulnerability assessmentTypes of vulnerability assessment based on the location; External vulnerability assessment; Internal vulnerability assessment; Based on knowledge about environment/infrastructure; Black-box testing; White-box testing; Gray-box testing; Announced and unannounced testing; Automated testing; Authenticated and unauthenticated scans; Agentless and agent-based scans; Manual testing; Estimating the resources and deliverables; Preparing a test plan; Getting approval and signing NDAs; Confidentiality and nondisclosure agreements; Summary 
505 8 |a Chapter 4: Information GatheringWhat is information gathering?; Importance of information gathering; Passive information gathering; Reverse IP lookup; Site report; Site archive and way-back; Site metadata; Looking for vulnerable systems using Shodan; Advanced information gathering using Maltego; the Harvester; Active information gathering; Active information gathering with SPARTA; Recon-ng; Dmitry; Summary; Chapter 5: Enumeration and Vulnerability Assessment; What is enumeration?; Enumerating services; HTTP; FTP; SMTP; SMB; DNS; SSH; VNC; Using Nmap scripts; http-methods; smb-os-discovery 
520 |a Exercises; Chapter 2: Setting Up the Assessment Environment; Setting up a Kali virtual machine; Basics of Kali Linux; Environment configuration and setup; Web server; Secure Shell (SSH); File Transfer Protocol (FTP); Software management; List of tools to be used during assessment; Summary; Chapter 3: Security Assessment Prerequisites; Target scoping and planning; Gathering requirements; Preparing a detailed checklist of test requirements; Suitable time frame and testing hours; Identifying stakeholders; Deciding upon the type of vulnerability assessment. 
520 |a Being able to identify security loopholes has become critical to many businesses. That's where learning network security assessment becomes very important. This book will not only show you how to find out the system vulnerabilities but also help you build a network security threat model. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer networks  |x Security measures  |x Evaluation. 
650 0 |a Computer network protocols  |x Security measures  |x Evaluation. 
650 7 |a COMPUTER SCIENCE  |x General.  |2 bisacsh 
776 0 8 |i Print version:  |a Rahalkar, Sagar.  |t Network Vulnerability Assessment : Identify Security Loopholes in Your Network's Infrastructure.  |d Birmingham : Packt Publishing Ltd, ©2018  |z 9781788627252 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781788627252/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a EBSCOhost  |b EBSC  |n 1883885 
938 |a YBP Library Services  |b YANK  |n 15684630 
994 |a 92  |b IZTAP