Skip to Main Content
Vulnerability Management
book

Vulnerability Management

by Park Foreman
August 2009
Intermediate to advanced content levelIntermediate to advanced
347 pages
9h 16m
English
Auerbach Publications
Content preview from Vulnerability Management
seleCting teChnology 163
required to scan a single host (TT) absent the overhead for
gathering, formatting, and transmitting results.
4. Calculate the amount of time required for the scanning over-
head (OH) mentioned earlier. e overhead for the larger
sample is the amount of time required to audit S2 minus time
to scan all of S2 targets: S2 − (S2 − hosts * ST). e point is
that there is a significant difference in the amount of time to
scan targets versus the time to complete all of the activities of
the audit.
5. Extrapolate and estimate the time to scan the entire network
by multiplying the number of total hosts in the network by
TT and add overhead: X = TT * OH. e final column in
Table 5.1 shows this number. e sum of these figures shows ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Vulnerability Management, 2nd Edition

Vulnerability Management, 2nd Edition

Park Foreman

Publisher Resources

ISBN: 9781439801512