Chapter 28. Assessing the Security of a Network
In this chapter: | |
Types of Security Assessments | 606 |
How to Conduct Security Assessments | 610 |
Conducting Penetration Tests | 613 |
Best Practices | 619 |
Additional Information | 620 |
By now, you have vigilantly implemented security measures and deployed security updates. But how do you know if your network is really secure? If you have not yet asked yourself this question, now is a good time to do so. Security trickles down through organizations, from executives to IT managers, and eventually to you, the network administrator. Unlike many IT implementations, where clear, tangible indicators of success exist and direct proof of this question can be delivered, no network is 100 percent secure.
For example, if you deploy ...
Get Microsoft® Windows® Security Resource Kit, Second Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.