Over the last few years, computing has changed to an almost purely networked environment, but the technical aspects of information protection have not kept up. As a result, the success of information security programmes has increasingly become a function of our ability to make prudent management dec
✦ LIBER ✦
Managing network security — Part 5: Risk management or risk analysis
✍ Scribed by Fred Cohen
- Publisher
- Elsevier Science
- Year
- 1997
- Tongue
- English
- Weight
- 640 KB
- Volume
- 1997
- Category
- Article
- ISSN
- 1353-4858
No coin nor oath required. For personal study only.
✦ Synopsis
Properly conducted penetration testing is a viable mechanism for providing practical, "where the rubber meets the road" assessment of a given firewall implementation's overall strength. Management should remember, limitations of a given test when considering the results.
References
📜 SIMILAR VOLUMES
Managing network security: Risk staging
✍
Fred Cohen
📂
Article
📅
1998
🏛
Elsevier Science
🌐
English
⚖ 470 KB
Managing Network Security: Balancing ris
✍
Fred Cohen
📂
Article
📅
1998
🏛
Elsevier Science
🌐
English
⚖ 429 KB
Managing network security — Part 8: Rela
✍
Fred Cohen
📂
Article
📅
1997
🏛
Elsevier Science
🌐
English
⚖ 247 KB
Over the last few years, computing has changed to an almost purely networked environment, but the technical aspects of information protection have not kept up. As a result, the success of information security programmes has increasingly become a function of our ability to make prudent management dec
Computer and network security risk manag
✍
Mohamed Hamdi; Noureddine Boudriga
📂
Article
📅
2005
🏛
John Wiley and Sons
🌐
English
⚖ 270 KB
👁 1 views
Managing network security — Part 11: To
✍
Fred Cohen
📂
Article
📅
1997
🏛
Elsevier Science
🌐
English
⚖ 345 KB
081009 (M00, B60) A framework for hazard
📂
Article
📅
1996
🏛
Elsevier Science
🌐
English
⚖ 94 KB