Skip to Main Content
Vulnerability Management
book

Vulnerability Management

by Park Foreman
August 2009
Intermediate to advanced content levelIntermediate to advanced
347 pages
9h 16m
English
Auerbach Publications
Content preview from Vulnerability Management
strategiC Vulnerabilities 295
threat level of any vulnerability in this zone versus in others.
Although the assets themselves may not have as much value,
the damage to the company’s reputation and public image can
be difficult to repair.
Keep the aperture of attack small on targets handling criti-•
cal data. Database servers are a good example. ey contain
information critical to the organization, and therefore should
be kept in their own defensive zone. is zone should restrict
traffic to the bare minimum required. Additional security
devices can keep the systems and data safe while the remedies
to zero-day attacks surface.
Use mutually supporting defenses. Similar to the establish-•
ment of zones, the security features of a particular ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Vulnerability Management, 2nd Edition

Vulnerability Management, 2nd Edition

Park Foreman

Publisher Resources

ISBN: 9781439801512