Skip to Main Content
Vulnerability Management
book

Vulnerability Management

by Park Foreman
August 2009
Intermediate to advanced content levelIntermediate to advanced
347 pages
9h 16m
English
Auerbach Publications
Content preview from Vulnerability Management
186 Vulnerability ManageMent
password requires change. Such changes can often impact other sys-
tems that rely on the particular configuration of the target.
6.2.6 Monitor and Adjust
By reviewing the results of the audit, problems can be identified and
parameters altered to prevent potential disruptions of service and to
increase accuracy. Networks, target configurations, and organiza-
tions are dynamic. What worked today may not work tomorrow. So,
some amount of monitoring of results and performance is necessary to
assure smooth operation. It is not unusual for a network manager to
add VLANs and remap IP addresses of hosts, with the change going
unnoticed by the security and audit groups. ese types of changes
should be identified and address ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Vulnerability Management, 2nd Edition

Vulnerability Management, 2nd Edition

Park Foreman

Publisher Resources

ISBN: 9781439801512