Chapter 28. Assessing the Security of a Network

In this chapter: 
Types of Security Assessments606
How to Conduct Security Assessments610
Conducting Penetration Tests613
Best Practices619
Additional Information620

By now, you have vigilantly implemented security measures and deployed security updates. But how do you know if your network is really secure? If you have not yet asked yourself this question, now is a good time to do so. Security trickles down through organizations, from executives to IT managers, and eventually to you, the network administrator. Unlike many IT implementations, where clear, tangible indicators of success exist and direct proof of this question can be delivered, no network is 100 percent secure.

For example, if you deploy ...

Get Microsoft® Windows® Security Resource Kit, Second Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.