Technical (Bottom-Up)
The goal of this six-step process is to maximize the time spent during the technical phases of a network vulnerability assessment (NVA). The hope for the process is that it will give anyone running an NVA the most “bang for the buck.” Each of the steps in the model builds on the previous steps. Whil...
Gespeichert in:
Hauptverfasser: | , , |
---|---|
Format: | Buchkapitel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | The goal of this six-step process is to maximize the time spent during the
technical phases of a network vulnerability assessment (NVA). The hope for
the process is that it will give anyone running an NVA the most “bang for the
buck.” Each of the steps in the model builds on the previous steps. While it
is possible to skip steps, it will often result in a less efficient NVA. |
---|---|
DOI: | 10.1201/9780203503041-10 |