Managing A Network Vulnerability Assessment
The instant access that hackers have to the latest tools and techniques demands that companies become more aggressive in defending the security of their networks. Conducting a network vulnerability assessment, a self-induced hack attack, identifies the network components and faults in policies, and...
Đã lưu trong:
Những tác giả chính: | , , |
---|---|
Định dạng: | Sách |
Ngôn ngữ: | English |
Được phát hành: |
CRC Press
2009
|
Truy cập trực tuyến: | http://scholar.dlu.edu.vn/thuvienso/handle/DLU123456789/1320 |
Các nhãn: |
Thêm thẻ
Không có thẻ, Là người đầu tiên thẻ bản ghi này!
|
Thư viện lưu trữ: | Thư viện Trường Đại học Đà Lạt |
---|
id |
oai:scholar.dlu.edu.vn:DLU123456789-1320 |
---|---|
record_format |
dspace |
spelling |
oai:scholar.dlu.edu.vn:DLU123456789-13202009-11-27T07:54:25Z Managing A Network Vulnerability Assessment Blackley, John A Peltier, Justin Peltier, Thomas The instant access that hackers have to the latest tools and techniques demands that companies become more aggressive in defending the security of their networks. Conducting a network vulnerability assessment, a self-induced hack attack, identifies the network components and faults in policies, and procedures that expose a company to the damage caused by malicious network intruders. Managing a Network Vulnerability Assessment provides a formal framework for finding and eliminating network security threats, ensuring that no vulnerabilities are overlooked. This thorough overview focuses on the steps necessary to successfully manage an assessment, including the development of a scope statement, the understanding and proper use of assessment methodology, the creation of an expert assessment team, and the production of a valuable response report. The book also details what commercial, freeware, and shareware tools are available, how they work, and how to use them. By following the procedures outlined in this guide, a company can pinpoint what individual parts of their network need to be hardened, and avoid expensive and unnecessary purchases. Introduction * Information Security Lifecycle * Network Vulnerability Assessment * Do I Need to be a Technical Expert to Run an NVA? * What Level of Skill Is Needed? * Which Specific Skills Are Needed? * Can One Person Run an NVA? * Introduction to Vulnerability Assessment * Goals of Vulnerability Assessment * How Many Trees Should Die to Generate This Type of Report? * What Are Vulnerabilities? * Classes of Vulnerabilities * Elements of a Good Vulnerability Assessment Project Scoping * General Scoping Practices * Developing the Project Overview Statement * Developing the Project Scope * Project Scope Document * Project Scope Change * Summary Assessing Current Network Concerns * Network Vulnerability Assessment Timeline * Network Vulnerability Assessment Team (NVAT) * Threats to Computer Systems * Other Concerns * Additional Threats * Prioritizing Risks and Threats * Other Considerations * Checklists * Summary Network Vulnerability Assessment Methodology * Methodology Purpose * Definitions * Justification * Philosophy * Top-Down Examination * Bottom-Up Examination * Network Vulnerability Assessment Methodology * The NVA Process (Step-by-Step) * Summary Policy Review (Top-Down) Methodology * Definitions * Policy * Review Elements * Summary Technical Network Vulnerability Assessment Methodology * Step 1: Site Survey * Step 2: Develop a Test Plan * Step 3: Building the Toolkit * Step 4: Conduct the Assessment * Step 5: Analysis * Step 6: Documentation * Summary Network Vulnerability Assessment Sample Report * Table of Contents * Executive Summary * Body of the NVA Report * Summary Summary Appendices * ISO17799 Self-Assessment Checklist * Window NT Server 4.0 Checklist * Network Vulnerability Assessment Checklist * Pre-NVA Checklist * Sample NVA Report * NIST Special Publications * Glossary of Terms 2009-11-27T07:54:24Z 2009-11-27T07:54:24Z 2003 Book http://scholar.dlu.edu.vn/thuvienso/handle/DLU123456789/1320 en application/octet-stream CRC Press |
institution |
Thư viện Trường Đại học Đà Lạt |
collection |
Thư viện số |
language |
English |
description |
The instant access that hackers have to the latest tools and techniques demands that companies become more aggressive in defending the security of their networks. Conducting a network vulnerability assessment, a self-induced hack attack, identifies the network components and faults in policies, and procedures that expose a company to the damage caused by malicious network intruders.
Managing a Network Vulnerability Assessment provides a formal framework for finding and eliminating network security threats, ensuring that no vulnerabilities are overlooked. This thorough overview focuses on the steps necessary to successfully manage an assessment, including the development of a scope statement, the understanding and proper use of assessment methodology, the creation of an expert assessment team, and the production of a valuable response report. The book also details what commercial, freeware, and shareware tools are available, how they work, and how to use them.
By following the procedures outlined in this guide, a company can pinpoint what individual parts of their network need to be hardened, and avoid expensive and unnecessary purchases. |
format |
Book |
author |
Blackley, John A Peltier, Justin Peltier, Thomas |
spellingShingle |
Blackley, John A Peltier, Justin Peltier, Thomas Managing A Network Vulnerability Assessment |
author_facet |
Blackley, John A Peltier, Justin Peltier, Thomas |
author_sort |
Blackley, John A |
title |
Managing A Network Vulnerability Assessment |
title_short |
Managing A Network Vulnerability Assessment |
title_full |
Managing A Network Vulnerability Assessment |
title_fullStr |
Managing A Network Vulnerability Assessment |
title_full_unstemmed |
Managing A Network Vulnerability Assessment |
title_sort |
managing a network vulnerability assessment |
publisher |
CRC Press |
publishDate |
2009 |
url |
http://scholar.dlu.edu.vn/thuvienso/handle/DLU123456789/1320 |
_version_ |
1757654883513663488 |