Skip to Main Content
Vulnerability Management
book

Vulnerability Management

by Park Foreman
August 2009
Intermediate to advanced content levelIntermediate to advanced
347 pages
9h 16m
English
Auerbach Publications
Content preview from Vulnerability Management
228 Vulnerability ManageMent
vulnerabilities and inventory rather than monitoring the impact on
operations. Figure 7.6b is a sample real-time report of the status of
various passive vulnerability analyzers. e metrics found here are very
different and this is only one possible conglomeration of metrics. For
the purposes of this discussion, let’s assume that there is a device on
each network in a physical location. e devices are named for the net-
works monitored. Shown are three types of networks and likely metrics
to be seen, depending on variability of the operating environment.
Run for a specified time window, this report has the following col-
umns: the device name of the network/device performing analysis,
new targets seen from the prev
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Vulnerability Management, 2nd Edition

Vulnerability Management, 2nd Edition

Park Foreman

Publisher Resources

ISBN: 9781439801512