Skip to Main Content
Managing A Network Vulnerability Assessment
book

Managing A Network Vulnerability Assessment

by Thomas R. Peltier, Justin Peltier, John A. Blackley
July 2017
Intermediate to advanced content levelIntermediate to advanced
312 pages
8h 31m
English
Auerbach Publications
Content preview from Managing A Network Vulnerability Assessment
Technical (Bottom-Up) Methodology 93
you will conduct. For the site survey, you really just need to know if it is
going to be included. However, even if a formal physical security review is
not necessary on your target network, keep your eyes open for potential
physical gaps in security. This is more applicable if you are a consultant than
if you are running the NVA from inside your target organization. This is due
to the fact that if you are an employee of the organization for which you are
performing the security review, you will already know where the physical
security holes are.
Having determined the media types, the concentrator types, the number
and type of operating systems, the start and stop point of the target network,
the network protocols ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Network Vulnerability Assessment

Network Vulnerability Assessment

Sagar Rahalkar
Cybersecurity Risk Management

Cybersecurity Risk Management

Cynthia Brumfield, Brian Haugli

Publisher Resources

ISBN: 9780203503041