Introduction 9
There are additional types of soft vulnerabilities, including:
A lack of general security policies
General security policies go against industry best practices
A lack of security system procedures
A lack of configuration or change management
Logging not enabled
Log files ignored or deleted frequently
Elements of a Good Vulnerability Assessment
To perform a good network vulnerability assessment, you should incorporate
at least four elements:
1. Comprehensive
2. Experience
3. Results must be reproducible
4. Multi-Test Environment (MTE)
The comprehensiveness of network vulnerability assessment is generally
affected or set by the scope statement we will discuss later. In addition, the
comprehensiveness of your network vulnerability ...