Skip to Content
Security De-Engineering
book

Security De-Engineering

by Ian Tibble
December 2011
Intermediate to advanced content levelIntermediate to advanced
332 pages
9h 15m
English
Auerbach Publications
Content preview from Security De-Engineering
111
5
Au t o m A t e d Vu l n e r A b i l i t y
Sc A n n e r S
is chapter is quite technical in some areas. If your security strat-
egy is geared purely toward compliance and passing the audit with
minimum analysis, and you are happy with that picture, you may skip
this chapter and pretend it never existed. You may continue to rely on
near-full automation in your vulnerability management strategy, but
I do need to give a warning: I would be more than happy to make a
huge wager to the eect that more than 90% of the victims of recent
unauthorized activities based their vulnerability management purely
on the use of automated assessment tools.
Automated vulnerability scanners are tools such as Nessus and GFI
LANguard, which supposedly can be
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Advanced Persistent Threat

Advanced Persistent Threat

Eric Cole
Point & Click OpenOffice.org!

Point & Click OpenOffice.org!

Robin ‘Roblimo’ Miller

Publisher Resources

ISBN: 9781439868355