Tools Used for Assessments and Evaluations

Assessments are not all about paperwork, policy, and documentation. Numerous tools can be used to help analyze, assess, and test the network's security infrastructure. Good security will require that funds be spent, but a multitude of excellent open source software products are available and some of them may just suit your needs. Therefore, the goal here is to introduce you to a variety of commercial and open source tools and offer you a high-level overview. These tools have also been divided into categories, because after all, nothing is used in a vacuum.

Note

If you want to know more, the vendor's website is always a good place to start. If you are looking for a real in-depth examination, there are books that have been written about many of these tools. Two good choices are

Hacking Exposed (ISBN: 0072260815)

Anti-Hacker Tool Kit (ISBN: 0072230207)


Introduction to Assessing Network Vulnerabilities

Foundations and Principles of Security

Why Risk Assessment

Risk-Assessment Methodologies

Scoping the Project

Understanding the Attacker

Performing the Assessment

Tools Used for Assessments and Evaluations

Preparing the Final Report

Post-Assessment Activities

Appendix A. Security Assessment Resources

Appendix B. Security Assessment Forms

Appendix C. Security Assessment Sample Report

Appendix D. Dealing with Consultants and Outside Vendors

Appendix E. SIRT Team Report Format Template



Inside Network Security Assessment. Guarding your IT Infrastructure
Inside Network Security Assessment: Guarding Your IT Infrastructure
ISBN: 0672328097
EAN: 2147483647
Year: 2003
Pages: 138

Flylib.com © 2008-2020.
If you may any questions please contact us: flylib@qtcs.net