Skip to Main Content
Information Security Management Handbook, Volume 7, 6th Edition
book

Information Security Management Handbook, Volume 7, 6th Edition

by Richard O'Hanley, James S. Tiller
August 2013
Intermediate to advanced content levelIntermediate to advanced
434 pages
15h 17m
English
Auerbach Publications
Content preview from Information Security Management Handbook, Volume 7, 6th Edition
16 ◾  Information Security Management Handbook
8. Penetration testing—is is used to validate the risks associated with the identified vulner-
abilities and should be reviewed quarterly.
9. Source code review—is is the review of the software source code for vulnerabilities before
the software is released. is is to be done on all software developed internally or by vendors.
is is used during the software development phase (using the SDLC) to fix the vulnerable
code before the software goes into production.
10. Configuration hardening—is is the hardening of the system before it goes into production.
A hardened system image should be used to build the system as opposed to trying to harden
an image supplied by a vendor. Penetration testing a ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Information Security Management Handbook, Volume 5, 6th Edition

Information Security Management Handbook, Volume 5, 6th Edition

Micki Krause Nozaki, Harold F. Tipton
Information Security for Managers

Information Security for Managers

Michael Workman, Daniel C. Phelps, John N. Gathegi

Publisher Resources

ISBN: 9781466567498