Steps for a Vulnerability Scanning
The following are major steps for a vulnerability scanning:
- Set a scope.
- Determine goals
- Choose a technology
- Create a process for scanning for vulnerabilities
- Create a process for analyzing the results
Adopted from the book Assessing Network Security by Ben Smith, David LeBlanc, Kevin Lam. The detail discussions in Chapter 3 about each step are very good.
0 Comments:
Post a Comment
<< Home