Network security evaluation using the NSA IEM

Network Security Evaluation provides a methodology for conducting technical security evaluations of all the critical components of a target network. The book describes how the methodology evolved and how to define the proper scope of an evaluation, including the consideration of legal issues that ma...

Πλήρης περιγραφή

Άλλοι συγγραφείς: Rogers, Russ., Cunningham, Bryan.
Μορφή: Ηλεκτρονική πηγή
Γλώσσα: English
Στοιχεία έκδοσης: Rockland, MA : [Sebastopol, Calif.] : Syngress ; c2005.
Θέματα:
Διαθέσιμο Online: http://www.sciencedirect.com/science/book/9781597490351
Ετικέτες: Προσθήκη ετικέτας
Δεν υπάρχουν, Καταχωρήστε ετικέτα πρώτοι!
Πίνακας περιεχομένων:
  • Introduction to the IEM; Before You Start Evaluating; Setting Expectations; Scoping the Evaluation; Legal Planning Chapter; The Technical Evaluation Plan (TEP); Starting your On-Site Efforts; Enumeration Activities; Collecting the majority of vulnerabilities; Fine Tuning the Evaluation; On-Site Closing Meeting; Evaluation Analysis; Creating Measurements and Trending Results; Trending Metrics Chapter; Final Reporting Chapter; IEM Summary; Appendix A: Table of example tools for each of the 10 baseline activities; Appendix B: Sample TEP layout.