Skip to Main Content
Vulnerability Management
book

Vulnerability Management

by Park Foreman
August 2009
Intermediate to advanced content levelIntermediate to advanced
347 pages
9h 16m
English
Auerbach Publications
Content preview from Vulnerability Management
106 Vulnerability ManageMent
Simulate the typical latency on a WAN circuit in the lab dur-•
ing a scan. is will help gauge scan performance as well as
impact to production systems. Some vendors provide tools
that can use a packet capture from a network segment and a
performance profile, and then re-create the user experience
with the scan traffic and any given application injected. For
example, an accounting system could be placed on one side
of such a device while the scanner is on the other side. e
device simulates the traffic conditions at a peak time for a
particular office using a previously gathered profile.
Limit the number of TCP and UDP ports that are scanned •
during discovery and scanning. e tendency is to be as com-
prehensive as possible ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Vulnerability Management, 2nd Edition

Vulnerability Management, 2nd Edition

Park Foreman

Publisher Resources

ISBN: 9781439801512