Monday, June 06, 2005

Steps for a Vulnerability Scanning

The following are major steps for a vulnerability scanning:
  1. Set a scope.
  2. Determine goals
  3. Choose a technology
  4. Create a process for scanning for vulnerabilities
  5. Create a process for analyzing the results

Adopted from the book Assessing Network Security by Ben Smith, David LeBlanc, Kevin Lam. The detail discussions in Chapter 3 about each step are very good.


Post a Comment

<< Home