Loading…

Network security evaluation using the NSA IEM /

Network Security Evaluation provides a methodology for conducting technical security evaluations of all the critical components of a target network. The book describes how the methodology evolved and how to define the proper scope of an evaluation, including the consideration of legal issues that ma...

Full description

Bibliographic Details
Call Number:Libro Electrónico
Other Authors: Rogers, Russ, Cunningham, Bryan, JD
Format: Electronic eBook
Language:Inglés
Published: Rockland, MA : [Sebastopol, Calif.] : Syngress ; Distributed by O'Reilly Media in the United States and Canada, �2005.
�2005
Subjects:
Online Access:Texto completo
Table of Contents:
  • Introduction to the IEM; Before You Start Evaluating; Setting Expectations; Scoping the Evaluation; Legal Planning Chapter; The Technical Evaluation Plan (TEP); Starting your On-Site Efforts; Enumeration Activities; Collecting the majority of vulnerabilities; Fine Tuning the Evaluation; On-Site Closing Meeting; Evaluation Analysis; Creating Measurements and Trending Results; Trending Metrics Chapter; Final Reporting Chapter; IEM Summary; Appendix A: Table of example tools for each of the 10 baseline activities; Appendix B: Sample TEP layout.