Introduction to Assessing Network Vulnerabilities

This chapter introduces some basic security concepts, such as what security really is. It also starts the discussion of risk assessment as a process. Risk is all around us, and good Information Technology (IT) governance requires us to assess its potential dangers. Finally, this chapter will provide an overview of the network vulnerability assessment. Understanding how the network vulnerability assessment fits into the overall security program will help as we go through the entire process in subsequent chapters.

Introduction to Assessing Network Vulnerabilities

Foundations and Principles of Security

Why Risk Assessment

Risk-Assessment Methodologies

Scoping the Project

Understanding the Attacker

Performing the Assessment

Tools Used for Assessments and Evaluations

Preparing the Final Report

Post-Assessment Activities

Appendix A. Security Assessment Resources

Appendix B. Security Assessment Forms

Appendix C. Security Assessment Sample Report

Appendix D. Dealing with Consultants and Outside Vendors

Appendix E. SIRT Team Report Format Template

Inside Network Security Assessment. Guarding your IT Infrastructure
Inside Network Security Assessment: Guarding Your IT Infrastructure
ISBN: 0672328097
EAN: 2147483647
Year: 2003
Pages: 138 © 2008-2020.
If you may any questions please contact us: