Home Page Icon
Home Page
Table of Contents for
Dedication
Close
Dedication
by John A. Blackley, Justin Peltier, Thomas R. Peltier
Managing A Network Vulnerability Assessment
Front Cover
Dedication
Contents
Acknowledgments
About the Authors
Chapter 1: Introduction
Information Security Life Cycle
Network Vulnerability Assessment (NVA)
Do I Need to Be a Technical Expert to Run an NVA?
What Skill Level Is Needed?
What Specific Skills Are Needed?
Can One Person Perform an NVA?
Introduction to Vulnerability Assessment
Goals of Vulnerability Assessment
How Many Trees Should Die to Generate This Type of Report?
What Are Vulnerabilities?
Classes of Vulnerabilities
Elements of a Good Vulnerability Assessment
Summary
Chapter 2: Project Scoping
General Scoping Practices
Developing the Project Overview Statement
Developing the Project Scope (1/2)
Developing the Project Scope (2/2)
Project Scope Document
Project Scope Change
Summary
Chapter 3: Assessing Current Network Concerns
Network Vulnerability Assessment Timeline
Network Vulnerability Assessment Team (NVAT)
Threats to Computer Systems
Other Concerns
Additional Threats
Prioritizing Risks and Threats
Other Considerations
Checklists
Summary
Chapter 4: Network Vulnerability Assessment Methodology
Methodology Purpose
Definitions
Justification
Philosophy
Top-Down Examination
Bottom-Up Examination
Network Vulnerability Assessment Methodology (1/2)
Network Vulnerability Assessment Methodology (2/2)
The NVA Process, Step-by-Step (1/5)
The NVA Process, Step-by-Step (2/5)
The NVA Process, Step-by-Step (3/5)
The NVA Process, Step-by-Step (4/5)
The NVA Process, Step-by-Step (5/5)
Summary
Chapter 5: Policy Review (Top-Down) Methodology
Definitions
Policy Contents
Contents
Review Elements
Summary
Chapter 6: Technical (Bottom-Up)
Step 1: Site Survey
Step 2: Develop a Test Plan (1/3)
Step 2: Develop a Test Plan (2/3)
Step 2: Develop a Test Plan (3/3)
Step 3: Building the Toolkit (1/10)
Step 3: Building the Toolkit (2/10)
Step 3: Building the Toolkit (3/10)
Step 3: Building the Toolkit (4/10)
Step 3: Building the Toolkit (5/10)
Step 3: Building the Toolkit (6/10)
Step 3: Building the Toolkit (7/10)
Step 3: Building the Toolkit (8/10)
Step 3: Building the Toolkit (9/10)
Step 3: Building the Toolkit (10/10)
Step 4: Conduct the Assessment
Step 5: Analysis
Step 6: Documentation
Summary
Chapter 7: Network Vulnerability Assessment Sample Report
Table of Contents
Executive Summary
Body of the NVA Report
Summary (1/5)
Summary (2/5)
Summary (3/5)
Summary (4/5)
Summary (5/5)
Chapter 8: Summary
Appendices
Appendix A-1: ISO 17799 Self-Assessment Checklist
Appendix A-2: Windows NT Server 4.0 Checklist
Appendix A-3: Network Vulnerability Assessment Checklist (1/2)
Appendix A-3: Network Vulnerability Assessment Checklist (2/2)
Appendix B: Pre-NVA Checklist (1/2)
Appendix B: Pre-NVA Checklist (2/2)
Appendix C: Sample NVA Report (1/9)
Appendix C: Sample NVA Report (2/9)
Appendix C: Sample NVA Report (3/9)
Appendix C: Sample NVA Report (4/9)
Appendix C: Sample NVA Report (5/9)
Appendix C: Sample NVA Report (6/9)
Appendix C: Sample NVA Report (7/9)
Appendix C: Sample NVA Report (8/9)
Appendix C: Sample NVA Report (9/9)
Appendix D: NIST Special Publications
Appendix E: Glossary of Terms
A
B
C
D
E
F
G
H
I
J
L
M
N
O
P
Q
R
S
T
U
V
W
X
Z
Index (1/3)
Index (2/3)
Index (3/3)
Search in book...
Toggle Font Controls
Playlists
Add To
Create new playlist
Name your new playlist
Playlist description (optional)
Cancel
Create playlist
Sign In
Email address
Password
Forgot Password?
Create account
Login
or
Continue with Facebook
Continue with Google
Sign Up
Full Name
Email address
Confirm Email Address
Password
Login
Create account
or
Continue with Facebook
Continue with Google
Prev
Previous Chapter
Front Cover
Next
Next Chapter
Contents
v
Dedication
T
o Lisa, Julie, and
Amanda, our teammates and better halves.
Add Highlight
No Comment
..................Content has been hidden....................
You can't read the all page of ebook, please click
here
login for view all page.
Day Mode
Cloud Mode
Night Mode
Reset