Chapter 4. Vulnerability Assessment: Step One
Introduction
This chapter will begin our discussion of developing a vulnerability assessment (VA) methodology, by outlining the first steps to performing a proper vulnerability assessment. A vulnerability assessment is different from a penetration test in that typically you perform a VA with broad knowledge of the environment you are testing; as you will learn in an upcoming chapter, a pen test is typically more in-depth and focused. The purpose of a vulnerability assessment, as ...
Get The Best Damn IT Security Management Book Period now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.