Chapter 20. Collecting the Majority of Vulnerabilities

Introduction

This chapter covers the vulnerability scanning and host evaluation portions of the IEM (see Figure 20.1). Vulnerability scanning is conducted from the network perspective, and host evaluations are conducted directly on the target components or systems. You will more than likely have a different view of the system when you’re at the console than when you’re evaluating the systems from the network.

Figure 20.1. Phases ...

Get The Best Damn IT Security Management Book Period now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.