ABSTRACT

This book has been designed to assist the security professional in understanding what must be done to conduct a network vulnerability assessment (NVA). Because no organization has unlimited resources to devote to security, we attempted to divide the tasks into manageable portions. Because budgets are always strained, we attempted to show the security and audit professional where to get the tools that would be effective and as cheap as possible.