Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
www.SecurityOrb.com
Introduction
2
Security vulnerability assessments have become an
imperative part of any organization’s computer and
network security posture.
www.SecurityOrb.com
Introduction
3
www.SecurityOrb.com
Introduction
4
www.SecurityOrb.com
Assessment Levels
6
www.SecurityOrb.com
Assessment Process
8
Reports that are constructed from the security assessments are used
to provide a snap shot view of information system deficiencies for
short-term analysis as well as trending data for long-term
evaluation
www.SecurityOrb.com
Security Assessment Process
10
www.SecurityOrb.com
Security Assessment Process
11
www.SecurityOrb.com
Security Assessment Process
12
www.SecurityOrb.com
Security Assessment Process
13
www.SecurityOrb.com
Security Assessment Process
14
www.SecurityOrb.com
Vulnerability Assessment, Penetration Test &
Security Audit
16
www.SecurityOrb.com
Credential Scans vs Un-credential Scans
17
www.SecurityOrb.com
Credential Scans vs Un-credential Scans
19
www.SecurityOrb.com
Credential Scans vs. Un-credential Scans
20
www.SecurityOrb.com
What Vulnerability Scanning Can’t Do
21
www.SecurityOrb.com
Conclusion