O'Reilly logo

Hacking For Dummies, 4th Edition by Kevin Beaver

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 18

Managing Security Processes

In This Chapter

arrow Automating tasks

arrow Watching for misbehavior

arrow Outsourcing testing

arrow Keeping security on everyone’s mind

Information security is an ongoing process that you must manage effectively to be successful. This management goes beyond periodically applying patches and hardening systems. Performing your ethical hacking tests repeatedly is critical; information security threats and vulnerabilities emerge constantly. To put it another way, ethical hacking tests are just a snapshot of your overall information security, so you have to perform your tests continually to keep up with the latest security issues. Ongoing vigilance is required not only for compliance with various laws and regulations but also for minimizing business risks related to your information systems.

Automating the Ethical-Hacking Process

You can run a large portion of the following ethical hacking tests in this book automatically:

check.png Ping sweeps and port scans to show what systems ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required