Re: Vulnerability Assessment Methods
From: Tim (tim.van.cleave_at_pand0ra.us)
Date: 11 Mar 2004 13:38:54 -0800
NIST has a bunch of great documents regarding this. Most everything in
the 800 series has what you want covered. Email me offline if you want
firstname.lastname@example.org (The H-Bum) wrote in message news:<email@example.com>...
> Hi all
> I am looking for formal methods and comments (e.g. experience) on the
> best methods for running a vulnerability assessment (network hosts,
> routers, etc.). Essentially, I want to capture best practices and
> document them. I just don't want to do so without external input (i.e.
> I know how to use tools and do a VA, but I need to structure and doc.
> the methods for other people).
> Do you have formal methods or suggestions which you can share or can
> you point me to a resource?