228 Vulnerability ManageMent
vulnerabilities and inventory rather than monitoring the impact on
operations. Figure 7.6b is a sample real-time report of the status of
various passive vulnerability analyzers. e metrics found here are very
different and this is only one possible conglomeration of metrics. For
the purposes of this discussion, let’s assume that there is a device on
each network in a physical location. e devices are named for the net-
works monitored. Shown are three types of networks and likely metrics
to be seen, depending on variability of the operating environment.
Run for a specified time window, this report has the following col-
umns: the device name of the network/device performing analysis,
new targets seen from the prev