Book description
Offers a formal framework for finding and eliminating network security threats. This title focuses on the steps necessary to manage an assessment, including the development of a scope statement, the understanding and use of assessment methodology, the creation of an assessment team, and the production of a response report.
Table of contents
- Front Cover
- Dedication
- Contents
- Acknowledgments
- About the Authors
-
Chapter 1: Introduction
- Information Security Life Cycle
- Network Vulnerability Assessment (NVA)
- Do I Need to Be a Technical Expert to Run an NVA?
- What Skill Level Is Needed?
- What Specific Skills Are Needed?
- Can One Person Perform an NVA?
- Introduction to Vulnerability Assessment
- Goals of Vulnerability Assessment
- How Many Trees Should Die to Generate This Type of Report?
- What Are Vulnerabilities?
- Classes of Vulnerabilities
- Elements of a Good Vulnerability Assessment
- Summary
- Chapter 2: Project Scoping
- Chapter 3: Assessing Current Network Concerns
-
Chapter 4: Network Vulnerability Assessment Methodology
- Methodology Purpose
- Definitions
- Justification
- Philosophy
- Top-Down Examination
- Bottom-Up Examination
- Network Vulnerability Assessment Methodology (1/2)
- Network Vulnerability Assessment Methodology (2/2)
- The NVA Process, Step-by-Step (1/5)
- The NVA Process, Step-by-Step (2/5)
- The NVA Process, Step-by-Step (3/5)
- The NVA Process, Step-by-Step (4/5)
- The NVA Process, Step-by-Step (5/5)
- Summary
- Chapter 5: Policy Review (Top-Down) Methodology
-
Chapter 6: Technical (Bottom-Up)
- Step 1: Site Survey
- Step 2: Develop a Test Plan (1/3)
- Step 2: Develop a Test Plan (2/3)
- Step 2: Develop a Test Plan (3/3)
- Step 3: Building the Toolkit (1/10)
- Step 3: Building the Toolkit (2/10)
- Step 3: Building the Toolkit (3/10)
- Step 3: Building the Toolkit (4/10)
- Step 3: Building the Toolkit (5/10)
- Step 3: Building the Toolkit (6/10)
- Step 3: Building the Toolkit (7/10)
- Step 3: Building the Toolkit (8/10)
- Step 3: Building the Toolkit (9/10)
- Step 3: Building the Toolkit (10/10)
- Step 4: Conduct the Assessment
- Step 5: Analysis
- Step 6: Documentation
- Summary
- Chapter 7: Network Vulnerability Assessment Sample Report
- Chapter 8: Summary
-
Appendices
- Appendix A-1: ISO 17799 Self-Assessment Checklist
- Appendix A-2: Windows NT Server 4.0 Checklist
- Appendix A-3: Network Vulnerability Assessment Checklist (1/2)
- Appendix A-3: Network Vulnerability Assessment Checklist (2/2)
- Appendix B: Pre-NVA Checklist (1/2)
- Appendix B: Pre-NVA Checklist (2/2)
- Appendix C: Sample NVA Report (1/9)
- Appendix C: Sample NVA Report (2/9)
- Appendix C: Sample NVA Report (3/9)
- Appendix C: Sample NVA Report (4/9)
- Appendix C: Sample NVA Report (5/9)
- Appendix C: Sample NVA Report (6/9)
- Appendix C: Sample NVA Report (7/9)
- Appendix C: Sample NVA Report (8/9)
- Appendix C: Sample NVA Report (9/9)
- Appendix D: NIST Special Publications
- Appendix E: Glossary of Terms
- Index (1/3)
- Index (2/3)
- Index (3/3)
Product information
- Title: Managing A Network Vulnerability Assessment
- Author(s):
- Release date: July 2017
- Publisher(s): Auerbach Publications
- ISBN: 9780203503041
You might also like
book
Network Vulnerability Assessment
Build a network security threat model with this comprehensive learning guide Key Features Develop a network …
book
Network Security Assessment: From Vulnerability to Patch
This book will take readers from the discovery of vulnerabilities and the creation of the corresponding …
book
Network Security Strategies
Build a resilient network and prevent advanced cyber attacks and breaches Key Features Explore modern cybersecurity …
book
IT Security Risk Control Management: An Audit Preparation Plan
Follow step-by-step guidance to craft a successful security program. You will identify with the paradoxes of …