Abstract
This chapter focuses on what a vulnerability assessment is, a traditional and alternative method for discovering vulnerabilities, and the importance of seeking out vulnerabilities. It discusses the steps involved in conducting a vulnerability assessment: information gathering/discovery, enumeration, and detection. It also provides an introductory view to vulnerability assessment. Single disciplines such as patch management, configuration management, and security management have evolved to support a function known as vulnerability management. Patch and configuration management technologies have traditionally supported nonsecurity-related initiatives, but nowadays they are primarily leveraged to detect and remediate security liabilities. Traditional methods of vulnerability assessment still provide the most accurate level of vulnerability information, because VA doesn't require administrative rights, it is capable of detecting all hosts residing within our network, and most important, it provides the hacker perspective of devices. In today's environment, a hybrid approach to vulnerability assessment that leverages security, patch, and configuration technologies will provide the greatest gains with optimal efficiency.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.