O'Reilly logo

Inside Network Security Assessment: Guarding Your IT Infrastructure by David Kim, Michael Gregg

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Risk Assessment Best Practices

When you’re conducting a risk assessment, it is important to define what the goals and objectives are for the risk assessment and what that organization would like to accomplish by conducting one.

Risk and vulnerability assessments provide the necessary information about an organization’s IT infrastructure and its asset’s current level of security. This level of security allows the assessor to provide recommendations for increasing or enhancing that IT asset’s level of security based on the identified and known vulnerabilities that are inherent in the IT infrastructure and its assets.

There are many best practices or approaches to consider when conducting a risk and vulnerability assessment on an IT infrastructure ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required