Skip to Main Content
Vulnerability Management
book

Vulnerability Management

by Park Foreman
August 2009
Intermediate to advanced content levelIntermediate to advanced
347 pages
9h 16m
English
Auerbach Publications
Content preview from Vulnerability Management
teChnology 111
technology from the same vendor, then perhaps a unified console will
eliminate this problem.
Alternative approaches are to allocate the assessment resources by
organization or network. For example, it may be beneficial to use pas-
sive vulnerability scanners on a public DMZ in order to get 24-hour
coverage of the security posture of the hosts. is most current assess-
ment information can be automatically fed to a security event/incident
management system (SEIM). is provides a significant advantage,
for newly published vulnerabilities can be taken into account quickly
when new events occur to exploit them. Active vulnerability scanners
can obtain more in-depth analysis of the back-end systems and work-
stations where rapid response ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Vulnerability Management, 2nd Edition

Vulnerability Management, 2nd Edition

Park Foreman

Publisher Resources

ISBN: 9781439801512