CHAPTER 46

VULNERABILITY ASSESSMENT

Rebecca Gurley Bace

46.1 SCOREKEEPER OF SECURITY MANAGEMENT

46.1.1 What Is Vulnerability Management?

46.1.2 What Is Vulnerability Assessment?

46.1.3 Where Does Vulnerability Assessment Fit in Security Management?

46.1.4 Brief History of Vulnerability Assessment

46.2 TAXONOMY OF VULNERABILITY ASSESSMENT TECHNOLOGIES

46.2.1 Vulnerability Assessment Strategy and Techniques

46.2.2 Network Scanning

46.2.3 Vulnerability Scanning

46.2.4 Assessment Strategies

46.2.5 Strengths and Weaknesses of VAS

46.2.6 Roles for Vulnerability Assessment in System Security Management

46.3 PENETRATION TESTING

46.3.1 Penetration Test Goals

46.3.2 Attributes of Penetration Testing

46.3.3 Social Engineering

46.3.4 Managing Penetration Testing

46.4 FURTHER READING

46.5 NOTES

46.1 SCOREKEEPER OF SECURITY MANAGEMENT.

Information security has, over time, evolved from a collection of esoteric security issues and technical remedies to its current state, in which it is more tightly integrated with the area of enterprise risk management. One effect of this move from technology to management discipline is the growth in the deployment and use of vulnerability management (and its primary technical constituent, vulnerability assessment [VA]) systems. These systems are considered fundamental to modern information security practice and have matured in architecture, features, and interfaces to accommodate the changing landscape of modern enterprises.

46.1.1 What Is Vulnerability Management? ...

Get Computer Security Handbook, Fifth Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.