86
Chapter 9. Vulnerability Assessment
9.3.5. Anticipating Your Future Needs
Depending upon your target and resources, there are any number of tools available. There are tools for
wireless networks, Novell networks, UNIX systems, Linux systems, and more. Another essential part
of performing assessments may include reviewing physical security as well as war dialing dialing
numbers and extensions enterprise wide for modem access to your network. New concepts, such as
war walking scanning the perimeter of your enterprise's physical structures for wireless network
access are some emerging concepts that you can investigate and, if needed, incorporate in your
assessments. Imagination and exposure are the only limits of planning and conducting vulnerability
assessments.
footer
Our partners:
PHP: Hypertext Preprocessor Best Web Hosting
Java Web Hosting
Inexpensive Web Hosting
Jsp Web Hosting
Cheapest Web Hosting
Jsp Hosting
Cheap Hosting
Visionwebhosting.net Business web hosting division of Web
Design Plus. All rights reserved