Re: Vulnerability Assessment Methods

From: Tim (tim.van.cleave_at_pand0ra.us)
Date: 03/11/04


Date: 11 Mar 2004 13:38:54 -0800

NIST has a bunch of great documents regarding this. Most everything in
the 800 series has what you want covered. Email me offline if you want
more information.

http://csrc.nist.gov/publications/nistpubs/index.html

hhutger@yahoo.com (The H-Bum) wrote in message news:<e3dc0fa8.0403030903.681fdfea@posting.google.com>...
> Hi all
>
> I am looking for formal methods and comments (e.g. experience) on the
> best methods for running a vulnerability assessment (network hosts,
> routers, etc.). Essentially, I want to capture best practices and
> document them. I just don't want to do so without external input (i.e.
> I know how to use tools and do a VA, but I need to structure and doc.
> the methods for other people).
>
> Do you have formal methods or suggestions which you can share or can
> you point me to a resource?
>
> Thanks
>
> H.