Abstract

This chapter provides a concise guide to vulnerability management. In addition to various concepts, examples, and product screenshots it serves as a comprehensive methodology checklist for vulnerability management. It offers eight essential steps for vulnerability management. These steps include: knowing one's assets, categorizing these assets, creating a baseline scan of the assets, performing penetration test on certain assets, remediating vulnerabilities and risk, creating a vulnerability assessment (VA) schedule, creating a patch and change management process, and monitoring for new risks to assets. The chapter also demonstrates the close link among vulnerability assessment, patch management, configuration management, and threat awareness—in ways that help one understand that each of these is a required step when dealing with vulnerabilities, and that each is truly capable of securing a vulnerable network. Various security tools are also presented in the chapter. A tool that has worked great for one, may not work as well for the other. Thus, these tools should be selected based on the specific requirements.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.