Network vulnerability assessment :: identify security loopholes in your network's infrastructure /
Exercises; Chapter 2: Setting Up the Assessment Environment; Setting up a Kali virtual machine; Basics of Kali Linux; Environment configuration and setup; Web server; Secure Shell (SSH); File Transfer Protocol (FTP); Software management; List of tools to be used during assessment; Summary; Chapter 3...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Birmingham, UK :
Packt Publishing,
2018.
|
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | Exercises; Chapter 2: Setting Up the Assessment Environment; Setting up a Kali virtual machine; Basics of Kali Linux; Environment configuration and setup; Web server; Secure Shell (SSH); File Transfer Protocol (FTP); Software management; List of tools to be used during assessment; Summary; Chapter 3: Security Assessment Prerequisites; Target scoping and planning; Gathering requirements; Preparing a detailed checklist of test requirements; Suitable time frame and testing hours; Identifying stakeholders; Deciding upon the type of vulnerability assessment. Being able to identify security loopholes has become critical to many businesses. That's where learning network security assessment becomes very important. This book will not only show you how to find out the system vulnerabilities but also help you build a network security threat model. |
Beschreibung: | 1 online resource (1 volume) : illustrations |
ISBN: | 9781788624725 1788624726 |
Internformat
MARC
LEADER | 00000cam a2200000 i 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-on1055555635 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr unu|||||||| | ||
008 | 181003s2018 enka o 000 0 eng d | ||
040 | |a UMI |b eng |e rda |e pn |c UMI |d N$T |d TEFOD |d N$T |d TOH |d CEF |d G3B |d STF |d UAB |d YDX |d OCLCQ |d OCLCO |d KSU |d OCLCQ |d OCLCO |d OCLCL | ||
019 | |a 1099994200 | ||
020 | |a 9781788624725 |q (electronic bk.) | ||
020 | |a 1788624726 |q (electronic bk.) | ||
020 | |z 9781788627252 | ||
035 | |a (OCoLC)1055555635 |z (OCoLC)1099994200 | ||
037 | |a CL0500000995 |b Safari Books Online | ||
037 | |a B13C9F25-6435-4878-849E-243BB03BD264 |b OverDrive, Inc. |n http://www.overdrive.com | ||
050 | 4 | |a TK5105.59 | |
072 | 7 | |a COM |x 000000 |2 bisacsh | |
082 | 7 | |a 005.8 |2 23 | |
049 | |a MAIN | ||
100 | 1 | |a Rahalkar, Sagar, |e author. | |
245 | 1 | 0 | |a Network vulnerability assessment : |b identify security loopholes in your network's infrastructure / |c Sagar Rahalkar. |
264 | 1 | |a Birmingham, UK : |b Packt Publishing, |c 2018. | |
300 | |a 1 online resource (1 volume) : |b illustrations | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
588 | 0 | |a Online resource; title from title page (Safari, viewed October 1, 2018). | |
505 | 0 | |a Cover; Title Page; Copyright and Credits; Packt Upsell; Contributors; Table of Contents; Preface; Chapter 1: Vulnerability Management Governance; Security basics; The CIA triad; Confidentiality ; Integrity; Availability; Identification; Authentication; Authorization; Auditing ; Accounting ; Non-repudiation ; Vulnerability ; Threats ; Exposure ; Risk ; Safeguards ; Attack vectors ; Understanding the need for security assessments; Types of security tests; Security testing; Vulnerability assessment versus penetration testing; Security assessment; Security audit | |
505 | 8 | |a Business drivers for vulnerability managementRegulatory compliance; Satisfying customer demands; Response to some fraud/incident; Gaining a competitive edge; Safeguarding/protecting critical infrastructures; Calculating ROIs; Setting up the context; Bottom-up; Top-down; Policy versus procedure versus standard versus guideline; Vulnerability assessment policy template; Penetration testing standards; Penetration testing lifecycle; Industry standards; Open Web Application Security Project testing guide; Benefits of the framework; Penetration testing execution standard; Benefits of the framework | |
505 | 8 | |a Types of vulnerability assessmentTypes of vulnerability assessment based on the location; External vulnerability assessment; Internal vulnerability assessment; Based on knowledge about environment/infrastructure; Black-box testing; White-box testing; Gray-box testing; Announced and unannounced testing; Automated testing; Authenticated and unauthenticated scans; Agentless and agent-based scans; Manual testing; Estimating the resources and deliverables; Preparing a test plan; Getting approval and signing NDAs; Confidentiality and nondisclosure agreements; Summary | |
505 | 8 | |a Chapter 4: Information GatheringWhat is information gathering?; Importance of information gathering; Passive information gathering; Reverse IP lookup; Site report; Site archive and way-back; Site metadata; Looking for vulnerable systems using Shodan; Advanced information gathering using Maltego; the Harvester; Active information gathering; Active information gathering with SPARTA; Recon-ng; Dmitry; Summary; Chapter 5: Enumeration and Vulnerability Assessment; What is enumeration?; Enumerating services; HTTP; FTP; SMTP; SMB; DNS; SSH; VNC; Using Nmap scripts; http-methods; smb-os-discovery | |
520 | |a Exercises; Chapter 2: Setting Up the Assessment Environment; Setting up a Kali virtual machine; Basics of Kali Linux; Environment configuration and setup; Web server; Secure Shell (SSH); File Transfer Protocol (FTP); Software management; List of tools to be used during assessment; Summary; Chapter 3: Security Assessment Prerequisites; Target scoping and planning; Gathering requirements; Preparing a detailed checklist of test requirements; Suitable time frame and testing hours; Identifying stakeholders; Deciding upon the type of vulnerability assessment. | ||
520 | |a Being able to identify security loopholes has become critical to many businesses. That's where learning network security assessment becomes very important. This book will not only show you how to find out the system vulnerabilities but also help you build a network security threat model. | ||
650 | 0 | |a Computer networks |x Security measures |x Evaluation. | |
650 | 0 | |a Computer network protocols |x Security measures |x Evaluation. | |
650 | 6 | |a Réseaux d'ordinateurs |x Sécurité |x Mesures |x Évaluation. | |
650 | 6 | |a Protocoles de réseaux d'ordinateurs |x Sécurité |x Mesures |x Évaluation. | |
650 | 7 | |a COMPUTER SCIENCE |x General. |2 bisacsh | |
758 | |i has work: |a Network Vulnerability Assessment (Text) |1 https://id.oclc.org/worldcat/entity/E39PCYmfjWMW4rjg4kVHhJbtpd |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |a Rahalkar, Sagar. |t Network Vulnerability Assessment : Identify Security Loopholes in Your Network's Infrastructure. |d Birmingham : Packt Publishing Ltd, ©2018 |z 9781788627252 |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1883885 |3 Volltext |
938 | |a EBSCOhost |b EBSC |n 1883885 | ||
938 | |a YBP Library Services |b YANK |n 15684630 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-on1055555635 |
---|---|
_version_ | 1816882473288597504 |
adam_text | |
any_adam_object | |
author | Rahalkar, Sagar |
author_facet | Rahalkar, Sagar |
author_role | aut |
author_sort | Rahalkar, Sagar |
author_variant | s r sr |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | T - Technology |
callnumber-label | TK5105 |
callnumber-raw | TK5105.59 |
callnumber-search | TK5105.59 |
callnumber-sort | TK 45105.59 |
callnumber-subject | TK - Electrical and Nuclear Engineering |
collection | ZDB-4-EBA |
contents | Cover; Title Page; Copyright and Credits; Packt Upsell; Contributors; Table of Contents; Preface; Chapter 1: Vulnerability Management Governance; Security basics; The CIA triad; Confidentiality ; Integrity; Availability; Identification; Authentication; Authorization; Auditing ; Accounting ; Non-repudiation ; Vulnerability ; Threats ; Exposure ; Risk ; Safeguards ; Attack vectors ; Understanding the need for security assessments; Types of security tests; Security testing; Vulnerability assessment versus penetration testing; Security assessment; Security audit Business drivers for vulnerability managementRegulatory compliance; Satisfying customer demands; Response to some fraud/incident; Gaining a competitive edge; Safeguarding/protecting critical infrastructures; Calculating ROIs; Setting up the context; Bottom-up; Top-down; Policy versus procedure versus standard versus guideline; Vulnerability assessment policy template; Penetration testing standards; Penetration testing lifecycle; Industry standards; Open Web Application Security Project testing guide; Benefits of the framework; Penetration testing execution standard; Benefits of the framework Types of vulnerability assessmentTypes of vulnerability assessment based on the location; External vulnerability assessment; Internal vulnerability assessment; Based on knowledge about environment/infrastructure; Black-box testing; White-box testing; Gray-box testing; Announced and unannounced testing; Automated testing; Authenticated and unauthenticated scans; Agentless and agent-based scans; Manual testing; Estimating the resources and deliverables; Preparing a test plan; Getting approval and signing NDAs; Confidentiality and nondisclosure agreements; Summary Chapter 4: Information GatheringWhat is information gathering?; Importance of information gathering; Passive information gathering; Reverse IP lookup; Site report; Site archive and way-back; Site metadata; Looking for vulnerable systems using Shodan; Advanced information gathering using Maltego; the Harvester; Active information gathering; Active information gathering with SPARTA; Recon-ng; Dmitry; Summary; Chapter 5: Enumeration and Vulnerability Assessment; What is enumeration?; Enumerating services; HTTP; FTP; SMTP; SMB; DNS; SSH; VNC; Using Nmap scripts; http-methods; smb-os-discovery |
ctrlnum | (OCoLC)1055555635 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>05540cam a2200541 i 4500</leader><controlfield tag="001">ZDB-4-EBA-on1055555635</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr unu||||||||</controlfield><controlfield tag="008">181003s2018 enka o 000 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">UMI</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="e">pn</subfield><subfield code="c">UMI</subfield><subfield code="d">N$T</subfield><subfield code="d">TEFOD</subfield><subfield code="d">N$T</subfield><subfield code="d">TOH</subfield><subfield code="d">CEF</subfield><subfield code="d">G3B</subfield><subfield code="d">STF</subfield><subfield code="d">UAB</subfield><subfield code="d">YDX</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">KSU</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCL</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">1099994200</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781788624725</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1788624726</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781788627252</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1055555635</subfield><subfield code="z">(OCoLC)1099994200</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">CL0500000995</subfield><subfield code="b">Safari Books Online</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">B13C9F25-6435-4878-849E-243BB03BD264</subfield><subfield code="b">OverDrive, Inc.</subfield><subfield code="n">http://www.overdrive.com</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">TK5105.59</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">000000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Rahalkar, Sagar,</subfield><subfield code="e">author.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Network vulnerability assessment :</subfield><subfield code="b">identify security loopholes in your network's infrastructure /</subfield><subfield code="c">Sagar Rahalkar.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Birmingham, UK :</subfield><subfield code="b">Packt Publishing,</subfield><subfield code="c">2018.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (1 volume) :</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Online resource; title from title page (Safari, viewed October 1, 2018).</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Cover; Title Page; Copyright and Credits; Packt Upsell; Contributors; Table of Contents; Preface; Chapter 1: Vulnerability Management Governance; Security basics; The CIA triad; Confidentiality ; Integrity; Availability; Identification; Authentication; Authorization; Auditing ; Accounting ; Non-repudiation ; Vulnerability ; Threats ; Exposure ; Risk ; Safeguards ; Attack vectors ; Understanding the need for security assessments; Types of security tests; Security testing; Vulnerability assessment versus penetration testing; Security assessment; Security audit</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Business drivers for vulnerability managementRegulatory compliance; Satisfying customer demands; Response to some fraud/incident; Gaining a competitive edge; Safeguarding/protecting critical infrastructures; Calculating ROIs; Setting up the context; Bottom-up; Top-down; Policy versus procedure versus standard versus guideline; Vulnerability assessment policy template; Penetration testing standards; Penetration testing lifecycle; Industry standards; Open Web Application Security Project testing guide; Benefits of the framework; Penetration testing execution standard; Benefits of the framework</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Types of vulnerability assessmentTypes of vulnerability assessment based on the location; External vulnerability assessment; Internal vulnerability assessment; Based on knowledge about environment/infrastructure; Black-box testing; White-box testing; Gray-box testing; Announced and unannounced testing; Automated testing; Authenticated and unauthenticated scans; Agentless and agent-based scans; Manual testing; Estimating the resources and deliverables; Preparing a test plan; Getting approval and signing NDAs; Confidentiality and nondisclosure agreements; Summary</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Chapter 4: Information GatheringWhat is information gathering?; Importance of information gathering; Passive information gathering; Reverse IP lookup; Site report; Site archive and way-back; Site metadata; Looking for vulnerable systems using Shodan; Advanced information gathering using Maltego; the Harvester; Active information gathering; Active information gathering with SPARTA; Recon-ng; Dmitry; Summary; Chapter 5: Enumeration and Vulnerability Assessment; What is enumeration?; Enumerating services; HTTP; FTP; SMTP; SMB; DNS; SSH; VNC; Using Nmap scripts; http-methods; smb-os-discovery</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Exercises; Chapter 2: Setting Up the Assessment Environment; Setting up a Kali virtual machine; Basics of Kali Linux; Environment configuration and setup; Web server; Secure Shell (SSH); File Transfer Protocol (FTP); Software management; List of tools to be used during assessment; Summary; Chapter 3: Security Assessment Prerequisites; Target scoping and planning; Gathering requirements; Preparing a detailed checklist of test requirements; Suitable time frame and testing hours; Identifying stakeholders; Deciding upon the type of vulnerability assessment.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Being able to identify security loopholes has become critical to many businesses. That's where learning network security assessment becomes very important. This book will not only show you how to find out the system vulnerabilities but also help you build a network security threat model.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="x">Evaluation.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer network protocols</subfield><subfield code="x">Security measures</subfield><subfield code="x">Evaluation.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Réseaux d'ordinateurs</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Mesures</subfield><subfield code="x">Évaluation.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Protocoles de réseaux d'ordinateurs</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Mesures</subfield><subfield code="x">Évaluation.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTER SCIENCE</subfield><subfield code="x">General.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="758" ind1=" " ind2=" "><subfield code="i">has work:</subfield><subfield code="a">Network Vulnerability Assessment (Text)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCYmfjWMW4rjg4kVHhJbtpd</subfield><subfield code="4">https://id.oclc.org/worldcat/ontology/hasWork</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Rahalkar, Sagar.</subfield><subfield code="t">Network Vulnerability Assessment : Identify Security Loopholes in Your Network's Infrastructure.</subfield><subfield code="d">Birmingham : Packt Publishing Ltd, ©2018</subfield><subfield code="z">9781788627252</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1883885</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">1883885</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">15684630</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-4-EBA-on1055555635 |
illustrated | Illustrated |
indexdate | 2024-11-27T13:29:10Z |
institution | BVB |
isbn | 9781788624725 1788624726 |
language | English |
oclc_num | 1055555635 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource (1 volume) : illustrations |
psigel | ZDB-4-EBA |
publishDate | 2018 |
publishDateSearch | 2018 |
publishDateSort | 2018 |
publisher | Packt Publishing, |
record_format | marc |
spelling | Rahalkar, Sagar, author. Network vulnerability assessment : identify security loopholes in your network's infrastructure / Sagar Rahalkar. Birmingham, UK : Packt Publishing, 2018. 1 online resource (1 volume) : illustrations text txt rdacontent computer c rdamedia online resource cr rdacarrier Online resource; title from title page (Safari, viewed October 1, 2018). Cover; Title Page; Copyright and Credits; Packt Upsell; Contributors; Table of Contents; Preface; Chapter 1: Vulnerability Management Governance; Security basics; The CIA triad; Confidentiality ; Integrity; Availability; Identification; Authentication; Authorization; Auditing ; Accounting ; Non-repudiation ; Vulnerability ; Threats ; Exposure ; Risk ; Safeguards ; Attack vectors ; Understanding the need for security assessments; Types of security tests; Security testing; Vulnerability assessment versus penetration testing; Security assessment; Security audit Business drivers for vulnerability managementRegulatory compliance; Satisfying customer demands; Response to some fraud/incident; Gaining a competitive edge; Safeguarding/protecting critical infrastructures; Calculating ROIs; Setting up the context; Bottom-up; Top-down; Policy versus procedure versus standard versus guideline; Vulnerability assessment policy template; Penetration testing standards; Penetration testing lifecycle; Industry standards; Open Web Application Security Project testing guide; Benefits of the framework; Penetration testing execution standard; Benefits of the framework Types of vulnerability assessmentTypes of vulnerability assessment based on the location; External vulnerability assessment; Internal vulnerability assessment; Based on knowledge about environment/infrastructure; Black-box testing; White-box testing; Gray-box testing; Announced and unannounced testing; Automated testing; Authenticated and unauthenticated scans; Agentless and agent-based scans; Manual testing; Estimating the resources and deliverables; Preparing a test plan; Getting approval and signing NDAs; Confidentiality and nondisclosure agreements; Summary Chapter 4: Information GatheringWhat is information gathering?; Importance of information gathering; Passive information gathering; Reverse IP lookup; Site report; Site archive and way-back; Site metadata; Looking for vulnerable systems using Shodan; Advanced information gathering using Maltego; the Harvester; Active information gathering; Active information gathering with SPARTA; Recon-ng; Dmitry; Summary; Chapter 5: Enumeration and Vulnerability Assessment; What is enumeration?; Enumerating services; HTTP; FTP; SMTP; SMB; DNS; SSH; VNC; Using Nmap scripts; http-methods; smb-os-discovery Exercises; Chapter 2: Setting Up the Assessment Environment; Setting up a Kali virtual machine; Basics of Kali Linux; Environment configuration and setup; Web server; Secure Shell (SSH); File Transfer Protocol (FTP); Software management; List of tools to be used during assessment; Summary; Chapter 3: Security Assessment Prerequisites; Target scoping and planning; Gathering requirements; Preparing a detailed checklist of test requirements; Suitable time frame and testing hours; Identifying stakeholders; Deciding upon the type of vulnerability assessment. Being able to identify security loopholes has become critical to many businesses. That's where learning network security assessment becomes very important. This book will not only show you how to find out the system vulnerabilities but also help you build a network security threat model. Computer networks Security measures Evaluation. Computer network protocols Security measures Evaluation. Réseaux d'ordinateurs Sécurité Mesures Évaluation. Protocoles de réseaux d'ordinateurs Sécurité Mesures Évaluation. COMPUTER SCIENCE General. bisacsh has work: Network Vulnerability Assessment (Text) https://id.oclc.org/worldcat/entity/E39PCYmfjWMW4rjg4kVHhJbtpd https://id.oclc.org/worldcat/ontology/hasWork Print version: Rahalkar, Sagar. Network Vulnerability Assessment : Identify Security Loopholes in Your Network's Infrastructure. Birmingham : Packt Publishing Ltd, ©2018 9781788627252 FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1883885 Volltext |
spellingShingle | Rahalkar, Sagar Network vulnerability assessment : identify security loopholes in your network's infrastructure / Cover; Title Page; Copyright and Credits; Packt Upsell; Contributors; Table of Contents; Preface; Chapter 1: Vulnerability Management Governance; Security basics; The CIA triad; Confidentiality ; Integrity; Availability; Identification; Authentication; Authorization; Auditing ; Accounting ; Non-repudiation ; Vulnerability ; Threats ; Exposure ; Risk ; Safeguards ; Attack vectors ; Understanding the need for security assessments; Types of security tests; Security testing; Vulnerability assessment versus penetration testing; Security assessment; Security audit Business drivers for vulnerability managementRegulatory compliance; Satisfying customer demands; Response to some fraud/incident; Gaining a competitive edge; Safeguarding/protecting critical infrastructures; Calculating ROIs; Setting up the context; Bottom-up; Top-down; Policy versus procedure versus standard versus guideline; Vulnerability assessment policy template; Penetration testing standards; Penetration testing lifecycle; Industry standards; Open Web Application Security Project testing guide; Benefits of the framework; Penetration testing execution standard; Benefits of the framework Types of vulnerability assessmentTypes of vulnerability assessment based on the location; External vulnerability assessment; Internal vulnerability assessment; Based on knowledge about environment/infrastructure; Black-box testing; White-box testing; Gray-box testing; Announced and unannounced testing; Automated testing; Authenticated and unauthenticated scans; Agentless and agent-based scans; Manual testing; Estimating the resources and deliverables; Preparing a test plan; Getting approval and signing NDAs; Confidentiality and nondisclosure agreements; Summary Chapter 4: Information GatheringWhat is information gathering?; Importance of information gathering; Passive information gathering; Reverse IP lookup; Site report; Site archive and way-back; Site metadata; Looking for vulnerable systems using Shodan; Advanced information gathering using Maltego; the Harvester; Active information gathering; Active information gathering with SPARTA; Recon-ng; Dmitry; Summary; Chapter 5: Enumeration and Vulnerability Assessment; What is enumeration?; Enumerating services; HTTP; FTP; SMTP; SMB; DNS; SSH; VNC; Using Nmap scripts; http-methods; smb-os-discovery Computer networks Security measures Evaluation. Computer network protocols Security measures Evaluation. Réseaux d'ordinateurs Sécurité Mesures Évaluation. Protocoles de réseaux d'ordinateurs Sécurité Mesures Évaluation. COMPUTER SCIENCE General. bisacsh |
title | Network vulnerability assessment : identify security loopholes in your network's infrastructure / |
title_auth | Network vulnerability assessment : identify security loopholes in your network's infrastructure / |
title_exact_search | Network vulnerability assessment : identify security loopholes in your network's infrastructure / |
title_full | Network vulnerability assessment : identify security loopholes in your network's infrastructure / Sagar Rahalkar. |
title_fullStr | Network vulnerability assessment : identify security loopholes in your network's infrastructure / Sagar Rahalkar. |
title_full_unstemmed | Network vulnerability assessment : identify security loopholes in your network's infrastructure / Sagar Rahalkar. |
title_short | Network vulnerability assessment : |
title_sort | network vulnerability assessment identify security loopholes in your network s infrastructure |
title_sub | identify security loopholes in your network's infrastructure / |
topic | Computer networks Security measures Evaluation. Computer network protocols Security measures Evaluation. Réseaux d'ordinateurs Sécurité Mesures Évaluation. Protocoles de réseaux d'ordinateurs Sécurité Mesures Évaluation. COMPUTER SCIENCE General. bisacsh |
topic_facet | Computer networks Security measures Evaluation. Computer network protocols Security measures Evaluation. Réseaux d'ordinateurs Sécurité Mesures Évaluation. Protocoles de réseaux d'ordinateurs Sécurité Mesures Évaluation. COMPUTER SCIENCE General. |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1883885 |
work_keys_str_mv | AT rahalkarsagar networkvulnerabilityassessmentidentifysecurityloopholesinyournetworksinfrastructure |