Home Page Icon
Home Page
Table of Contents for
Cover Page
Close
Cover Page
by Andrew Magnusson
Practical Vulnerability Management
Cover Page
Title Page
Copyright Page
Dedication
About the Author
BRIEF CONTENTS
CONTENTS IN DETAIL
ACKNOWLEDGMENTS
INTRODUCTION
Who This Book Is For
Back to Basics
Vulnerability Management Is Not Patch Management
Main Topics Covered
How This Book Is Organized
Outcomes
Get the Code
Important Disclaimer
PART I: VULNERABILITY MANAGEMENT BASICS
1 BASIC CONCEPTS
The CIA Triad and Vulnerabilities
What Is Vulnerability Management?
Vulnerability Management and Risk Management
Summary
2 SOURCES OF INFORMATION
Asset Information
Vulnerability Information
Exploit Data
Advanced Data Sources
Summary
3 VULNERABILITY SCANNERS
What Vulnerability Scanners Do
How Vulnerability Scanners Work
How to Deploy Vulnerability Scanners
Getting Results
Summary
4 AUTOMATING VULNERABILITY MANAGEMENT
Understanding the Automation Process
Data Collection
Automating Scans and Updates
Exploiting Your System’s Vulnerabilities
Summary
5 DEALING WITH VULNERABILITIES
Security Measures
Summary
6 ORGANIZATIONAL SUPPORT AND OFFICE POLITICS
Balancing Competing Priorities
Gaining Support
Summary
PART II: HANDS-ON VULNERABILITY MANAGEMENT
7 SETTING UP YOUR ENVIRONMENT
Setting Up the System
Installing the Tools
Keeping the System Updated
Summary
8 USING THE DATA COLLECTION TOOLS
An Introduction to the Tools
Getting Started with Nmap Scanning
Getting Started with OpenVAS
Getting Started with cve-search
Summary
9 CREATING AN ASSET AND VULNERABILITY DATABASE
Preparing the Database
Understanding the Database Structure
Getting Nmap into the Database
Getting OpenVAS into the Database
Summary
10 MAINTAINING THE DATABASE
Defining Database Indexes
Keeping the Data Fresh
Summary
11 GENERATING ASSET AND VULNERABILITY REPORTS
Asset Reports
Vulnerability Reports
Summary
12 AUTOMATING SCANS AND REPORTING
Visualizing the Automation Process
Planning the Script
Assembling the Script
Summary
13 ADVANCED REPORTING
Detailed Asset Reporting
Detailed Vulnerability Reporting
Exploitable Vulnerability Reporting
Summary
14 ADVANCED TOPICS
Building a Simple REST API
Automating Vulnerability Exploitation
Bringing the System into the Cloud
Summary
15 CONCLUSION
A Look Back
Commercial Vulnerability Management Products
Coming Trends in Information Security
In Closing
INDEX
Search in book...
Toggle Font Controls
Playlists
Add To
Create new playlist
Name your new playlist
Playlist description (optional)
Cancel
Create playlist
Sign In
Email address
Password
Forgot Password?
Create account
Login
or
Continue with Facebook
Continue with Google
Sign Up
Full Name
Email address
Confirm Email Address
Password
Login
Create account
or
Continue with Facebook
Continue with Google
Next
Next Chapter
Title Page
Add Highlight
No Comment
..................Content has been hidden....................
You can't read the all page of ebook, please click
here
login for view all page.
Day Mode
Cloud Mode
Night Mode
Reset