O'Reilly logo

Computer Evidence: Collection and Preservation, Second Edition by Christopher L. T. Brown

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Scope

The purpose of a “Full-System Knowledge” Network Security Assessment is to identify vulnerabilities in an enterprise’s network assets. The assessment can identify routers, switches, firewalls, hubs, print and file servers, and hosts. It can also identify operating systems and network services running on identified network devices. This information constitutes an effective electronic map from which the user can easily base exploitation to confirm vulnerabilities and should, therefore, be protected accordingly.

For the address spaces analyzed, Service Provider discovered 12 live hosts. The next section summarizes live hosts, potentially vulnerable hosts, and confirmed vulnerable hosts.

During the Host Discovery phase, Service Provider Network ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required