Network security assessment from vulnerability to patch

This book will take readers from the discovery of vulnerabilities and the creation of the corresponding exploits, through a complete security assessment, all the way through deploying patches against these vulnerabilities to protect their networks. This is unique in that it details both the manageme...

Descripción completa

Detalles Bibliográficos
Autor principal: Manzuik, Steve (-)
Otros Autores: Gatford, Chris, Gold, Andre
Formato: Libro electrónico
Idioma:Inglés
Publicado: Rockland, MA : Syngress Pub c2007.
Edición:1st edition
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009627260506719
Tabla de Contenidos:
  • Front Cover; Network Security Assessment: From Vulnerability to Patch; Copyright Page; Contents; Foreword; Chapter 1. Windows of Vulnerability; Introduction; What Are Vulnerabilities?; Understanding the Risks Posed by Vulnerabilities; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 2. Vulnerability Assessment 101; Introduction; What is a Vulnerability Assessment?; Seeking Out Vulnerabilities; Detecting Vulnerabilities via Security Technologies; The Importance of Seeking Out Vulnerabilities Looking Closer at the Numbers; Summary; Solutions Fast Track
  • Frequently Asked QuestionsChapter 3. Vulnerability Assessment Tools; Introduction; Features of a Good Vulnerability Assessment Tool; Using a Vulnerability Assessment Tool; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 4. Vulnerability Assessment: Step One; Introduction; Know Your Network; Classifying Your Assets; I Thought This Was a Vulnerability Assessment Chapter; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 5. Vulnerability Assessment: Step Two; Introduction; An Effective Scanning Program; Scanning Your Network; When to Scan; Summary
  • Solutions Fast TrackFrequently Asked Questions; Chapter 6. Going Further; Introduction; Types of Penetration Tests; Scenario: An Internal Network Attack; Penetration Testing; Vulnerability Assessment versus a Penetration Test; Internal versus External; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 7. Vulnerability Management; Introduction; The Vulnerability Management Plan; The Six Stages of Vulnerability Management; Governance (What the Auditors Want to Know); Measuring the Performance of a Vulnerability Management Program; Common Problems with Vulnerability Management
  • SummarySolutions Fast Track; Frequently Asked Questions; Chapter 8. Vulnerability Management Tools; Introduction; The Perfect Tool in a Perfect World; Evaluating Vulnerability Management Tools; Commercial Vulnerability Management Tools; Open Source and Free Vulnerability Management Tools; Managed Vulnerability Services; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 9. Vulnerability and Configuration Management; Introduction; What is Vulnerability Management?; Patch Management; Building a Patch Test Lab; Patch Distribution and Deployment; Configuration Management; Summary
  • Solutions Fast TrackFrequently Asked Questions; Chapter 10. Regulatory Compliance; Introduction; Regulating Assessments and Pen Tests; Drafting an Information Security Program; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 11. Tying It All Together; Introduction; A Vulnerability Management Methodology; Step One: Know Your Assets; Step Two: Categorize Your Assets; Step Three: Create a Baseline Scan of Assets; Step Four: Perform a Penetration Test on Certain Assets; Step Five: Remediate Vulnerabilities and Risk; Step Six: Create a Vulnerability Assessment Schedule
  • Step Seven: Create a Patch and Change Management Process