Skip to Main Content
Vulnerability Management
book

Vulnerability Management

by Park Foreman
August 2009
Intermediate to advanced content levelIntermediate to advanced
347 pages
9h 16m
English
Auerbach Publications
Content preview from Vulnerability Management
the Vulnerability exPerienCe 39
Now, once a change is completed, the change ticket is closed. At
Abacus, the ticket is closed but not the incident. First, a scan must
be performed on the system to verify the remediation success. In this
example, the strength of the password would be tested. If the vulner-
ability is no longer present, then the incident is manually closed.
So, we have now performed four manual tasks that could have been
automated. Follow this procedure in Figure 2.2. e boxes are shaded
to indicate which steps are manual and which are automated. ere
is little to no automation in this diagram. e diagram has numbers,
which correspond to the following:
1. A vulnerability manager reviews a report to identify critical
vulnerab ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Vulnerability Management, 2nd Edition

Vulnerability Management, 2nd Edition

Park Foreman

Publisher Resources

ISBN: 9781439801512