Skip to Main Content
Managing A Network Vulnerability Assessment
book

Managing A Network Vulnerability Assessment

by Thomas R. Peltier, Justin Peltier, John A. Blackley
July 2017
Intermediate to advanced content levelIntermediate to advanced
312 pages
8h 31m
English
Auerbach Publications
Content preview from Managing A Network Vulnerability Assessment
Introduction 9
There are additional types of soft vulnerabilities, including:
A lack of general security policies
General security policies go against industry best practices
A lack of security system procedures
A lack of configuration or change management
Logging not enabled
Log files ignored or deleted frequently
Elements of a Good Vulnerability Assessment
To perform a good network vulnerability assessment, you should incorporate
at least four elements:
1. Comprehensive
2. Experience
3. Results must be reproducible
4. Multi-Test Environment (MTE)
The comprehensiveness of network vulnerability assessment is generally
affected or set by the scope statement we will discuss later. In addition, the
comprehensiveness of your network vulnerability ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Network Vulnerability Assessment

Network Vulnerability Assessment

Sagar Rahalkar
Cybersecurity Risk Management

Cybersecurity Risk Management

Cynthia Brumfield, Brian Haugli

Publisher Resources

ISBN: 9780203503041