Advertisement

Vulnerability Management

  • Raymond Pompon
Chapter

Abstract

Most of the time, you shouldn’t work too hard at being exceptional. You’re better off first making sure that you avoid doing anything too stupid. If you are hacked because of some unpatched hole that’s been sitting around for months, you will look stupid. Where did that hole come from? We know that no matter how secure we make our systems, new vulnerabilities will be found. Your challenge is to find and fix the holes before the attackers exploit them. The process you use is called vulnerability management. It is a process that combines both technical and administrative controls, calling upon many different aspects of security and coordinating work between different departments.

Keywords

Network Device Really Simple Syndication Vulnerability Management Vulnerability Scanning Network Scanner 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Copyright information

© Raymond Pompon 2016

Authors and Affiliations

  • Raymond Pompon
    • 1
  1. 1.SeattleUSA

Personalised recommendations