Skip to Main Content
Vulnerability Management
book

Vulnerability Management

by Park Foreman
August 2009
Intermediate to advanced content levelIntermediate to advanced
347 pages
9h 16m
English
Auerbach Publications
Content preview from Vulnerability Management
ProCess 201
One must ultimately ask the question: if IAVA is so great, then
why do we continuously hear about the compromise of government
systems using common exploits? is is not intended to condemn the
process itself but perhaps the implementation. A key item that is lack-
ing is the incorporation of policy compliance into the IAVA process.
It is no more difficult to check for technical policy and standards com-
pliance with an automated tool than it is to check for vulnerabilities.
is ultimately leads us back to a discussion of standards because so
many disparate VM systems may not apply the same methods or lan-
guage for the checks they perform. is makes centralized, positive
control much less effective and more vulnerable to manipula
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Vulnerability Management, 2nd Edition

Vulnerability Management, 2nd Edition

Park Foreman

Publisher Resources

ISBN: 9781439801512