Dewey Decimal658.478
Table Of ContentIntroduction Part I: Vulnerability Management Basics Chapter 1: Basic Concepts Chapter 2: Sources of Information Chapter 3: Vulnerability Scanners Chapter 4: Automating Vulnerability Management Chapter 5: Vulnerability Management Outcomes Chapter 6: Vulnerability Management and Organizational Priorities Part II: Hands-on Vulnerability Management Chapter 7: Setting Up Your Environment Chapter 8: Using the Data Collection Tools Chapter 9: Getting Your Data into Usable Format Chapter 10: Maintaining the Database Chapter 11: Generating Asset and Vulnerability Reports Chapter 12: Automating Scans and Reporting Chapter 13: Advanced Reporting Chapter 14: Advanced Topics Chapter 15. Conclusion Index
SynopsisA hands-on guide to improving an organization's computer security and developing scanning tools on a budget., Practical Vulnerability Management shows you how to weed out system security weaknesses and squash cyber threats in their tracks. Bugs- they're everywhere. Software, firmware, hardware -- they all have them. Bugs even live in the cloud. And when one of these bugs is leveraged to wreak havoc or steal sensitive information, a company's prized technology assets suddenly become serious liabilities. Fortunately, exploitable security weaknesses are entirely preventable; you just have to find them before the bad guys do. Practical Vulnerability Management will help you achieve this goal on a budget, with a proactive process for detecting bugs and squashing the threat they pose. The book starts by introducing the practice of vulnerability management, its tools and components, and detailing the ways it improves an enterprise's overall security posture. Then it's time to get your hands dirty! As the content shifts from conceptual to practical, you're guided through creating a vulnerability-management system from the ground up, using open-source software. Along the way, you'll learn how to- Generate accurate and usable vulnerability intelligence Scan your networked systems to identify and assess bugs and vulnerabilities Prioritize and respond to various security risks Automate scans, data analysis, reporting, and other repetitive tasks Customize the provided scripts to adapt them to your own needs Playing whack-a-bug won't cut it against today's advanced adversaries. Use this book to set up, maintain, and enhance an effective vulnerability management system, and ensure your organization is always a step ahead of hacks and attacks., A hands-on guide to improving an organization's computer security and developing scanning tools on a budget. Practical Vulnerability Management discusses the components of a vulnerability management program and shows the reader how to build a free or low-cost system to automatically handle the repetitive aspects of vulnerability management. Vulnerability management is a critical and sometimes neglected aspect of information security. It consists of two main parts: awareness and action. First, the security practitioner must be aware of the vulnerabilities that exist in an organization's systems and understand how dangerous each one is. Second, that information must feed into an ongoing process of addressing vulnerabilities by updating the vulnerable systems or otherwise mitigating their severity., Practical Vulnerability Management shows you how to weed out system security weaknesses and squash cyber threats in their tracks. Bugs: they're everywhere. Software, firmware, hardware -- they all have them. Bugs even live in the cloud. And when one of these bugs is leveraged to wreak havoc or steal sensitive information, a company's prized technology assets suddenly become serious liabilities. Fortunately, exploitable security weaknesses are entirely preventable; you just have to find them before the bad guys do. Practical Vulnerability Management will help you achieve this goal on a budget, with a proactive process for detecting bugs and squashing the threat they pose. The book starts by introducing the practice of vulnerability management, its tools and components, and detailing the ways it improves an enterprise's overall security posture. Then it's time to get your hands dirty As the content shifts from conceptual to practical, you're guided through creating a vulnerability-management system from the ground up, using open-source software. Along the way, you'll learn how to: - Generate accurate and usable vulnerability intelligence - Scan your networked systems to identify and assess bugs and vulnerabilities - Prioritize and respond to various security risks - Automate scans, data analysis, reporting, and other repetitive tasks - Customize the provided scripts to adapt them to your own needs Playing whack-a-bug won't cut it against today's advanced adversaries. Use this book to set up, maintain, and enhance an effective vulnerability management system, and ensure your organization is always a step ahead of hacks and attacks.
LC Classification NumberTK5105.59.M36167