Technology
Vulnerability assessment technology comes in multiple flavors designed for various deployment strategies. These strategies are largely the result of restrictions imposed by the business-operating model. Factors such as the distribution of facilities and organization of infrastructure have a major influence on the technology choices made. Cost and efficiency are also ever-present factors in any decision. The selection criteria will be discussed in the next chapter. In this chapter, we will discuss the variety of technologies and the unique features and issues of each.
Notice to the reader: This chapter assumes that the reader has a strong familiarity with network protocols such as TCP/IP, virtual private ...
Get Vulnerability Management, 2nd Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.