14.5 Methodology Flow Diagram


The overall methodology is relatively straightforward; it covers initial and full network scanning, low-level network testing (depending on the type of network and filtering mechanisms), accessible service identification, investigation of vulnerabilities, and qualification of vulnerabilities. Figure 14-1 shows this flow diagram at a high-level and the data passed between each process.

Figure 14-1. A process flow diagram for network security assessment
figs/nsa_1401.gif

If you are new to security assessment, you will soon realize that it is highly time-consuming to search and cross reference various web sites and information sources for accurate vulnerability information. The "Investigation of Known Vulnerabilities" component shown in Figure 14-1 will prove hard to carry out the first few times you try, but after a while, you will be able to read through the port scan results, and get a good idea of the vulnerabilities to test for, and the exploits to use.



Network Security Assessment
Network Security Assessment: Know Your Network
ISBN: 059600611X
EAN: 2147483647
Year: 2006
Pages: 166
Authors: Chris McNab

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net