UID:
almafu_9959242053202883
Umfang:
1 online resource (412 p.)
Ausgabe:
1st edition
ISBN:
9786612540844
,
9786611112608
,
9781281112606
,
1281112607
,
9780080512532
,
0080512534
Inhalt:
This book will take readers from the discovery of vulnerabilities and the creation of the corresponding exploits, through a complete security assessment, all the way through deploying patches against these vulnerabilities to protect their networks. This is unique in that it details both the management and technical skill and tools required to develop an effective vulnerability management system. Business case studies and real world vulnerabilities are used through the book. It starts by introducing the reader to the concepts of a vulnerability management system. Readers will be provide
Anmerkung:
Description based upon print version of record.
,
Front Cover; Network Security Assessment: From Vulnerability to Patch; Copyright Page; Contents; Foreword; Chapter 1. Windows of Vulnerability; Introduction; What Are Vulnerabilities?; Understanding the Risks Posed by Vulnerabilities; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 2. Vulnerability Assessment 101; Introduction; What is a Vulnerability Assessment?; Seeking Out Vulnerabilities; Detecting Vulnerabilities via Security Technologies; The Importance of Seeking Out Vulnerabilities Looking Closer at the Numbers; Summary; Solutions Fast Track
,
Frequently Asked QuestionsChapter 3. Vulnerability Assessment Tools; Introduction; Features of a Good Vulnerability Assessment Tool; Using a Vulnerability Assessment Tool; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 4. Vulnerability Assessment: Step One; Introduction; Know Your Network; Classifying Your Assets; I Thought This Was a Vulnerability Assessment Chapter; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 5. Vulnerability Assessment: Step Two; Introduction; An Effective Scanning Program; Scanning Your Network; When to Scan; Summary
,
Solutions Fast TrackFrequently Asked Questions; Chapter 6. Going Further; Introduction; Types of Penetration Tests; Scenario: An Internal Network Attack; Penetration Testing; Vulnerability Assessment versus a Penetration Test; Internal versus External; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 7. Vulnerability Management; Introduction; The Vulnerability Management Plan; The Six Stages of Vulnerability Management; Governance (What the Auditors Want to Know); Measuring the Performance of a Vulnerability Management Program; Common Problems with Vulnerability Management
,
SummarySolutions Fast Track; Frequently Asked Questions; Chapter 8. Vulnerability Management Tools; Introduction; The Perfect Tool in a Perfect World; Evaluating Vulnerability Management Tools; Commercial Vulnerability Management Tools; Open Source and Free Vulnerability Management Tools; Managed Vulnerability Services; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 9. Vulnerability and Configuration Management; Introduction; What is Vulnerability Management?; Patch Management; Building a Patch Test Lab; Patch Distribution and Deployment; Configuration Management; Summary
,
Solutions Fast TrackFrequently Asked Questions; Chapter 10. Regulatory Compliance; Introduction; Regulating Assessments and Pen Tests; Drafting an Information Security Program; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 11. Tying It All Together; Introduction; A Vulnerability Management Methodology; Step One: Know Your Assets; Step Two: Categorize Your Assets; Step Three: Create a Baseline Scan of Assets; Step Four: Perform a Penetration Test on Certain Assets; Step Five: Remediate Vulnerabilities and Risk; Step Six: Create a Vulnerability Assessment Schedule
,
Step Seven: Create a Patch and Change Management Process
,
English
Weitere Ausg.:
ISBN 9781597491013
Weitere Ausg.:
ISBN 1597491012
Sprache:
Englisch
Bookmarklink