Executive Summary

Table of contents:

Introduction

In many ways, the introduction restates what has been briefly covered in the Executive Summary. Therefore, the first one or two paragraphs should discuss the organization, its locations, mission, employees, and the items that were assessed.

Again, why was the assessment performed? The reasons might be due diligence; compliance with state, provincial, or federal laws; a breach in security; or other factorsthe level of urgency will vary. So you will want to be sure to keep this in mind when detailing the project. Include what types of information the vulnerability assessment team gathered and how they gathered it.

Introduction to Assessing Network Vulnerabilities

Foundations and Principles of Security

Why Risk Assessment

Risk-Assessment Methodologies

Scoping the Project

Understanding the Attacker

Performing the Assessment

Tools Used for Assessments and Evaluations

Preparing the Final Report

Post-Assessment Activities

Appendix A. Security Assessment Resources

Appendix B. Security Assessment Forms

Appendix C. Security Assessment Sample Report

Appendix D. Dealing with Consultants and Outside Vendors

Appendix E. SIRT Team Report Format Template



Inside Network Security Assessment. Guarding your IT Infrastructure
Inside Network Security Assessment: Guarding Your IT Infrastructure
ISBN: 0672328097
EAN: 2147483647
Year: 2003
Pages: 138

Flylib.com © 2008-2020.
If you may any questions please contact us: flylib@qtcs.net