Chapter 9. An Introduction to Network Audit

Solutions in this chapter:

▪ What is a Vulnerability Assessment?
▪ A Survey of Vulnerability Assessment Tools
▪ Network Mapping
▪ Auditing Routers, Switches, and Other Network Infrastructure
Summary

Introduction

In this chapter we look at testing systems over the network. System testing is possible over the network, and provides a means to test compliance with:
▪ Change control processes,
▪ Patching and vulnerability mitigation,
▪ Malware (ensuring that no additional ports are listening),
▪ Basic Security configurations,
▪ Baselines Tests of systems, and
▪ Ensuring that no new or unauthorized hosts or networks have been connected.

What Is a Vulnerability Assessment?

The purpose of a vulnerability assessment is to ...

Get The IT Regulatory and Standards Compliance Handbook now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.