© Morey J. Haber, Brad Hibbert 2018
Morey J. Haber and Brad HibbertAsset Attack Vectorshttps://doi.org/10.1007/978-1-4842-3627-7_10

10. Penetration Testing

Morey J. Haber1  and Brad Hibbert2
(1)
Heathrow, Florida, USA
(2)
Carp, Ontario, Canada
 

One of the finer arts in protecting assets from threats is penetration testing. While beginners, and sometimes news media, confuse vulnerability assessments with penetration testing, they are distinctly different disciplines. The confusion, however, is sometimes justified. Vulnerability assessment solutions can sometimes use exploit code in order to determine if a vulnerability is present (typically referred to as an “unsafe” or intrusive check). and penetration solutions can have network scanners to identify ...

Get Asset Attack Vectors: Building Effective Vulnerability Management Strategies to Protect Organizations now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.