Managing A Network Vulnerability Assessment

The instant access that hackers have to the latest tools and techniques demands that companies become more aggressive in defending the security of their networks. Conducting a network vulnerability assessment, a self-induced hack attack, identifies the network components and faults in policies, and...

Mô tả đầy đủ

Đã lưu trong:
Chi tiết về thư mục
Những tác giả chính: Blackley, John A, Peltier, Justin, Peltier, Thomas
Định dạng: Sách
Ngôn ngữ:English
Được phát hành: CRC Press 2009
Truy cập trực tuyến:http://scholar.dlu.edu.vn/thuvienso/handle/DLU123456789/1320
Các nhãn: Thêm thẻ
Không có thẻ, Là người đầu tiên thẻ bản ghi này!
Thư viện lưu trữ: Thư viện Trường Đại học Đà Lạt
id oai:scholar.dlu.edu.vn:DLU123456789-1320
record_format dspace
spelling oai:scholar.dlu.edu.vn:DLU123456789-13202009-11-27T07:54:25Z Managing A Network Vulnerability Assessment Blackley, John A Peltier, Justin Peltier, Thomas The instant access that hackers have to the latest tools and techniques demands that companies become more aggressive in defending the security of their networks. Conducting a network vulnerability assessment, a self-induced hack attack, identifies the network components and faults in policies, and procedures that expose a company to the damage caused by malicious network intruders. Managing a Network Vulnerability Assessment provides a formal framework for finding and eliminating network security threats, ensuring that no vulnerabilities are overlooked. This thorough overview focuses on the steps necessary to successfully manage an assessment, including the development of a scope statement, the understanding and proper use of assessment methodology, the creation of an expert assessment team, and the production of a valuable response report. The book also details what commercial, freeware, and shareware tools are available, how they work, and how to use them. By following the procedures outlined in this guide, a company can pinpoint what individual parts of their network need to be hardened, and avoid expensive and unnecessary purchases. Introduction * Information Security Lifecycle * Network Vulnerability Assessment * Do I Need to be a Technical Expert to Run an NVA? * What Level of Skill Is Needed? * Which Specific Skills Are Needed? * Can One Person Run an NVA? * Introduction to Vulnerability Assessment * Goals of Vulnerability Assessment * How Many Trees Should Die to Generate This Type of Report? * What Are Vulnerabilities? * Classes of Vulnerabilities * Elements of a Good Vulnerability Assessment Project Scoping * General Scoping Practices * Developing the Project Overview Statement * Developing the Project Scope * Project Scope Document * Project Scope Change * Summary Assessing Current Network Concerns * Network Vulnerability Assessment Timeline * Network Vulnerability Assessment Team (NVAT) * Threats to Computer Systems * Other Concerns * Additional Threats * Prioritizing Risks and Threats * Other Considerations * Checklists * Summary Network Vulnerability Assessment Methodology * Methodology Purpose * Definitions * Justification * Philosophy * Top-Down Examination * Bottom-Up Examination * Network Vulnerability Assessment Methodology * The NVA Process (Step-by-Step) * Summary Policy Review (Top-Down) Methodology * Definitions * Policy * Review Elements * Summary Technical Network Vulnerability Assessment Methodology * Step 1: Site Survey * Step 2: Develop a Test Plan * Step 3: Building the Toolkit * Step 4: Conduct the Assessment * Step 5: Analysis * Step 6: Documentation * Summary Network Vulnerability Assessment Sample Report * Table of Contents * Executive Summary * Body of the NVA Report * Summary Summary Appendices * ISO17799 Self-Assessment Checklist * Window NT Server 4.0 Checklist * Network Vulnerability Assessment Checklist * Pre-NVA Checklist * Sample NVA Report * NIST Special Publications * Glossary of Terms 2009-11-27T07:54:24Z 2009-11-27T07:54:24Z 2003 Book http://scholar.dlu.edu.vn/thuvienso/handle/DLU123456789/1320 en application/octet-stream CRC Press
institution Thư viện Trường Đại học Đà Lạt
collection Thư viện số
language English
description The instant access that hackers have to the latest tools and techniques demands that companies become more aggressive in defending the security of their networks. Conducting a network vulnerability assessment, a self-induced hack attack, identifies the network components and faults in policies, and procedures that expose a company to the damage caused by malicious network intruders. Managing a Network Vulnerability Assessment provides a formal framework for finding and eliminating network security threats, ensuring that no vulnerabilities are overlooked. This thorough overview focuses on the steps necessary to successfully manage an assessment, including the development of a scope statement, the understanding and proper use of assessment methodology, the creation of an expert assessment team, and the production of a valuable response report. The book also details what commercial, freeware, and shareware tools are available, how they work, and how to use them. By following the procedures outlined in this guide, a company can pinpoint what individual parts of their network need to be hardened, and avoid expensive and unnecessary purchases.
format Book
author Blackley, John A
Peltier, Justin
Peltier, Thomas
spellingShingle Blackley, John A
Peltier, Justin
Peltier, Thomas
Managing A Network Vulnerability Assessment
author_facet Blackley, John A
Peltier, Justin
Peltier, Thomas
author_sort Blackley, John A
title Managing A Network Vulnerability Assessment
title_short Managing A Network Vulnerability Assessment
title_full Managing A Network Vulnerability Assessment
title_fullStr Managing A Network Vulnerability Assessment
title_full_unstemmed Managing A Network Vulnerability Assessment
title_sort managing a network vulnerability assessment
publisher CRC Press
publishDate 2009
url http://scholar.dlu.edu.vn/thuvienso/handle/DLU123456789/1320
_version_ 1757654883513663488