Skip to Main Content
Managing A Network Vulnerability Assessment
book

Managing A Network Vulnerability Assessment

by Thomas R. Peltier, Justin Peltier, John A. Blackley
July 2017
Intermediate to advanced content levelIntermediate to advanced
312 pages
8h 31m
English
Auerbach Publications
Content preview from Managing A Network Vulnerability Assessment
Introduction 7
has an idea that might produce a hole and asks for comment on the potential
feasibility. The next step in the discovery phase is where a “proof of concept”
script is written. At this stage, the script is only created to answer the question
posted to the newsgroup or Web site. Very few people are making use of the
newfound vulnerability. The only people who would know of the new
vulnerability’s existence would be friends of the person who submitted the
idea or regular readers of the Web site where it was initially posted. If the
script that was written to answer the original question is successful, the next
phase begins.
Vulnerability Announced
The second phase, ”Vulnerability Announced,” is where Web sites that spe-
cialize in announcing ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Network Vulnerability Assessment

Network Vulnerability Assessment

Sagar Rahalkar
Cybersecurity Risk Management

Cybersecurity Risk Management

Cynthia Brumfield, Brian Haugli

Publisher Resources

ISBN: 9780203503041