Technical (Bottom-Up)

The goal of this six-step process is to maximize the time spent during the technical phases of a network vulnerability assessment (NVA). The hope for the process is that it will give anyone running an NVA the most “bang for the buck.” Each of the steps in the model builds on the previous steps. Whil...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Blackley, John A, Peltier, Thomas R, Peltier, Justin
Format: Buchkapitel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:The goal of this six-step process is to maximize the time spent during the technical phases of a network vulnerability assessment (NVA). The hope for the process is that it will give anyone running an NVA the most “bang for the buck.” Each of the steps in the model builds on the previous steps. While it is possible to skip steps, it will often result in a less efficient NVA.
DOI:10.1201/9780203503041-10