Skip to content

Managing a Network Vulnerability Assessment

Best in textbook rentals since 2012!

ISBN-10: 0849312701

ISBN-13: 9780849312700

Edition: 2003

Authors: Thomas R. Peltier, Justin Peltier, John A. Blackley

List price: $105.00
Blue ribbon 30 day, 100% satisfaction guarantee!
what's this?
Rush Rewards U
Members Receive:
Carrot Coin icon
XP icon
You have reached 400 XP and carrot coins. That is the daily max!

Description:

Network vulnerability assessment involved a deliberate attempt by a network's owner to break into the network using the same means employed by hackers intent on illegal, unauthorized access to a network. This book provides a framework for network vulnerability assessment and ensures that nothing is overlooked.
Customers also bought

Book details

List price: $105.00
Copyright year: 2003
Publisher: Auerbach Publishers, Incorporated
Publication date: 5/28/2003
Binding: Paperback
Pages: 312
Size: 7.00" wide x 9.75" long x 0.75" tall
Weight: 1.188
Language: English

Peltier has numerous years of field experience in corporate information security, and is a member of the Advisory Council of the Computer Security Institute (CSI).

Senior Security Consultant, Peltier Associates

Acknowledgments
About the Authors
Introduction
Information Security Life Cycle
Network Vulnerability Assessment (NVA)
Do I Need to Be a Technical Expert to Run an NVA?
What Skill Level Is Needed?
What Specific Skills Are Needed?
Can One Person Perform an NVA?
Introduction to Vulnerability Assessment
Goals of Vulnerability Assessment
How Many Trees Should Die to Generate This Type of Report?
What Are Vulnerabilities?
Classes of Vulnerabilities
Elements of a Good Vulnerability Assessment
Summary
Project Scoping
General Scoping Practices
Developing the Project Overview Statement
Developing the Project Scope
Project Scope Document
Project Scope Change
Summary
Assessing Current Network Concerns
Network Vulnerability Assessment Timeline
Network Vulnerability Assessment Team (NVAT)
Threats to Computer Systems
Other Concerns
Additional Threats
Prioritizing Risks and Threats
Other Considerations
Checklists
Summary
Network Vulnerability Assessment Methodology
Methodology Purpose
Definitions
Justification
Philosophy
Top-Down Examination
Bottom-Up Examination
Network Vulnerability Assessment Methodology
The NVA Process, Step-by-Step
Summary
Policy Review (Top-Down) Methodology
Definitions
Policy Contents
Contents
Review Elements
Summary
Technical (Bottom-Up)
Site Survey
Develop a Test Plan
Building the Toolkit
Conduct the Assessment
Analysis
Documentation
Summary
Network Vulnerability Assessment Sample Report
Table of Contents
Executive Summary
Body of the NVA Report
Summary
Summary
Appendices
ISO 17799 Self-Assessment Checklist
Windows NT Server 4.0 Checklist
Network Vulnerability Assessment Checklist
Pre-NVA Checklist
Sample NVA Report
NIST Special Publications
Glossary of Terms
Index