Book Image

Network Vulnerability Assessment

By : Sagar Rahalkar
Book Image

Network Vulnerability Assessment

By: Sagar Rahalkar

Overview of this book

The tech world has been taken over by digitization to a very large extent, and so it’s become extremely important for an organization to actively design security mechanisms for their network infrastructures. Analyzing vulnerabilities can be one of the best ways to secure your network infrastructure. Network Vulnerability Assessment starts with network security assessment concepts, workflows, and architectures. Then, you will use open source tools to perform both active and passive network scanning. As you make your way through the chapters, you will use these scanning results to analyze and design a threat model for network security. In the concluding chapters, you will dig deeper into concepts such as IP network analysis, Microsoft Services, and mail services. You will also get to grips with various security best practices, which will help you build your network security mechanism. By the end of this book, you will be in a position to build a security framework fit for an organization.
Table of Contents (15 chapters)

Metrics

An organization may have a very robust vulnerability management program in place. However, there has to be some way by which the progress, success, or failure of the program can be measured. This is when metrics come in handy. Metrics are the key indicators of performance of the vulnerability management program. The organization leadership can take key decisions on strategy and budgeting based on the metrics. Metrics also help to showcase the overall security posture of the organization and raise an alarm for issues that need to be addressed as a priority.

Metrics can be derived based on the various compliance standards or can be completely customized based on the specific organizational needs. The section ahead describes a few such metrics and their relevance. These metrics can be reported at a frequency as per the organizational policy. These metrics can be best represented...