Chapter 13. Analyzing the Results

Solutions in this chapter:

▪ Organizing the Mapping Results
▪ Understanding the Map
▪ Identifying Vulnerabilities
▪ Follow-on Activities
Summary

Introduction

In this chapter we look at a few simple methods to baseline the network at a high level. Nearly all external attacks and many internal ones will be initially based on the exploit of a network service. Knowing the systems and services running over the network will greatly aid in securing the organization.
Breaking this process into manageable sections is the key to successfully completing it. Each stage of the overall process of creating a secure and compliance network is then “projectized” into controllable chunks. The SANS audit strategy is defined using the following ...

Get The IT Regulatory and Standards Compliance Handbook now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.