Skip to Main Content
Vulnerability Management
book

Vulnerability Management

by Park Foreman
August 2009
Intermediate to advanced content levelIntermediate to advanced
347 pages
9h 16m
English
Auerbach Publications
Content preview from Vulnerability Management
248 Vulnerability ManageMent
For example, the security standards may state that all file shares
require authenticated access. However, a specialized “swarm analysis”
vulnerability report shows a high vulnerability score for a category called
access controls. Drilling down into this area, the security manager finds
numerous instances of file shares allowing write access to everyone.
Knowing that security awareness training has not resulted in any
greater level of compliance, a technology alternative can be considered.
In this example, a group policy object (GPO) in Active Directory
might prevent further creation of such open file shares. is is a no-
cost solution to what could be a critical vulnerability problem.
One might wonder why such
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Vulnerability Management, 2nd Edition

Vulnerability Management, 2nd Edition

Park Foreman

Publisher Resources

ISBN: 9781439801512