Skip to Content
Foundations of Information Security
book

Foundations of Information Security

by Jason Andress
October 2019
Beginner
248 pages
7h 7m
English
No Starch Press
Content preview from Foundations of Information Security

14ASSESSING SECURITY

Image

Once you’ve put your security measures in place, you need to make sure they’re actually protecting your assets. As discussed in Chapter 6, complying with laws and regulations doesn’t actually mean you’re secure. Since that’s the case, how can you assess the true level of your security? You have two primary vehicles for doing so: vulnerability assessment and penetration testing. In this chapter, I’ll discuss these two methods.

Vulnerability Assessment

A vulnerability assessment is a process that uses a specially designed tool to scan for vulnerabilities. Two common vulnerability assessment tools are Qualys and Nessus. To create ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Fundamentals of Information Systems Security, 3rd Edition

Fundamentals of Information Systems Security, 3rd Edition

David Kim, Michael G. Solomon
Defensive Security Handbook

Defensive Security Handbook

Lee Brotherston, Amanda Berlin
Security in Computing

Security in Computing

Shari Lawrence Pfleeger, Charles P. Pfleeger, Jonathan Margulies

Publisher Resources

ISBN: 9781098122546