Skip to Main Content
Vulnerability Management
book

Vulnerability Management

by Park Foreman
August 2009
Intermediate to advanced content levelIntermediate to advanced
347 pages
9h 16m
English
Auerbach Publications
Content preview from Vulnerability Management
76 Vulnerability ManageMent
Since routing protocols and other network information are also •
visible to the traffic analyzer, it may also be able to map the
topology of the network and use this information to create a
picture of the attack surface of a more complex network. is
type of information can also be obtained by authenticated active
scans and by providing configuration data to specialized tools.
ere are also some interesting disadvantages to this technology:
e device typically must be installed on the switch that car-•
ries the traffic to be monitored. Remote monitoring of a net-
work is often not practical over a busy WAN connection. is ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Vulnerability Management, 2nd Edition

Vulnerability Management, 2nd Edition

Park Foreman

Publisher Resources

ISBN: 9781439801512