Determining What Tools to Use

Now that you’ve seen a few of the tools that can be used, it’s time to start thinking about which ones you’re going to use. A large part of this will be determined by what type of assessment you’ll be performing. You will probably find that system-level scanners will be one of the most useful tools to use regularly. You’ll also want to consider the disruption factor. For example, the analyst must determine what processes, both human and computer, must be put on hold during a VA scan. Certain scanning tools run intrusive scans that can disrupt network or computer systems as part of their operation. Many tools, however, can be automated. They can scan machines and networks and report their progress or generate a report ...

Get Inside Network Security Assessment: Guarding Your IT Infrastructure now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.