Vulnerability Exploit & website Hacking for Dummies.pdf

(4119 KB) Pobierz
lys
mpliments of Qua
With the co
ability
ulner
V
ement
anag
M
ition
Qualys Limited Ed
A Reference
Control the
security risks affecting
your network
®
Rest of Us!
FREE eTips at dummies.com
®
for the
Vulnerability
Management
FOR
DUMmIES
by Qualys
Vulnerability Management For Dummies
®
Published by
John Wiley & Sons, Ltd
The Atrium
Southern Gate
Chichester
West Sussex
PO19 8SQ
England
E-mail (for orders and customer service enquires):
cs-books@wiley.co.uk
Visit our Home Page on
www.wiley.com
Copyright © 2008 by John Wiley & Sons Ltd, Chichester, West Sussex, England
All Rights Reserved. No part of this publication may be reproduced, stored in a retrieval system or
transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning
or otherwise, except under the terms of the Copyright, Designs and Patents Act 1988 or under the
terms of a licence issued by the Copyright Licensing Agency Ltd, 90 Tottenham Court Road, London,
W1T 4LP, UK, without the permission in writing of the Publisher. Requests to the Publisher for per-
mission should be addressed to the Permissions Department, John Wiley & Sons, Ltd, The Atrium,
Southern Gate, Chichester, West Sussex, PO19 8SQ, England, or emailed to
permreq@wiley.co.uk
,
or faxed to (44) 1243 770620.
Trademarks:
Wiley, the Wiley Publishing logo, For Dummies, the Dummies Man logo, A Reference for
the Rest of Us!, The Dummies Way, Dummies Daily, The Fun and Easy Way, Dummies.com and related
trade dress are trademarks or registered trademarks of John Wiley & Sons, Inc. and/or its affiliates in
the United States and other countries, and may not be used without written permission. All other
trademarks are the property of their respective owners. Wiley Publishing, Inc., is not associated with
any product or vendor mentioned in this book.
LIMIT OF LIABILITY/DISCLAIMER OF WARRANTY: THE PUBLISHER, THE AUTHOR, AND
ANYONE ELSE INVOLVED IN PREPARING THIS WORK MAKE NO REPRESENTATIONS OR WAR-
RANTIES WITH RESPECT TO THE ACCURACY OR COMPLETENESS OF THE CONTENTS OF THIS
WORK AND SPECIFICALLY DISCLAIM ALL WARRANTIES, INCLUDING WITHOUT LIMITATION
WARRANTIES OF FITNESS FOR A PARTICULAR PURPOSE. NO WARRANTY MAY BE CREATED OR
EXTENDED BY SALES OR PROMOTIONAL MATERIALS. THE ADVICE AND STRATEGIES CON-
TAINED HEREIN MAY NOT BE SUITABLE FOR EVERY SITUATION. THIS WORK IS SOLD WITH
THE UNDERSTANDING THAT THE PUBLISHER IS NOT ENGAGED IN RENDERING LEGAL,
ACCOUNTING, OR OTHER PROFESSIONAL SERVICES. IF PROFESSIONAL ASSISTANCE IS
REQUIRED, THE SERVICES OF A COMPETENT PROFESSIONAL PERSON SHOULD BE SOUGHT.
NEITHER THE PUBLISHER NOR THE AUTHOR SHALL BE LIABLE FOR DAMAGES ARISING HERE-
FROM. THE FACT THAT AN ORGANIZATION OR WEBSITE IS REFERRED TO IN THIS WORK AS
A CITATION AND/OR A POTENTIAL SOURCE OF FURTHER INFORMATION DOES NOT MEAN
THAT THE AUTHOR OR THE PUBLISHER ENDORSES THE INFORMATION THE ORGANIZATION
OR WEBSITE MAY PROVIDE OR RECOMMENDATIONS IT MAY MAKE. FURTHER, READERS
SHOULD BE AWARE THAT INTERNET WEBSITES LISTED IN THIS WORK MAY HAVE CHANGED OR
DISAPPEARED BETWEEN WHEN THIS WORK WAS WRITTEN AND WHEN IT IS READ.
Wiley also publishes its books in a variety of electronic formats. Some content that appears in print
may not be available in electronic books.
ISBN: 978-0-470-69457-2
Printed and bound in Great Britain by Page Bros, Norwich
10 9 8 7 6 5 4 3 2 1
Introduction
W
elcome to
Vulnerability Management For Dummies!
Most of the successful attacks through a business net-
work could be prevented with vulnerability management. This
book is all about what you can do to automatically manage
vulnerabilities and keep your network safe from attack.
About This Book
This book simply explains the essential steps of vulnerability
management and shows you how to select the right tools.
Foolish Assumptions
In writing this book, we assume that you:
Are somewhat familiar with information technology and
networking.
Want to understand the risks of networking and buggy
software.
Are thinking about using a vulnerability management
application to improve your network security.
After reading this book you’ll know more about how to do net-
work vulnerability management.
How to Use This Book
This book is divided into five succinct parts:
Part I: Understanding the Need for Vulnerability
Management.
Start here if you need a primer.
Part II: Doing Vulnerability Management.
A guide to the
essential best-practice steps of successful vulnerability
management.
2
Vulnerability Management For Dummies
Part III: Considering Your Options for Vulnerability
Management.
Understand the pros and cons of different
options for automating vulnerability management.
Part IV: QualysGuard: Vulnerability Management
On Demand.
Introducing QualysGuard, the effective
Software-as-a-Service way to automate the vulnerability
management process.
Part V: Ten Best Practices for Doing Vulnerability
Management.
A ten-point checklist for removing vulnera-
bilities in your key resources.
Dip in and out of this book as you like – go to any part that
interests you immediately; or read it from cover to cover.
Icons Used in This Book
We highlight crucial text for you with the following icons:
This icon targets hints and shortcuts to help you get the best
from vulnerability management solutions.
Memorize these pearls of wisdom – and remember how much
better it is to read them here than to have your boss give a
know-it-all lecture.
The bomb means ‘whoops’. It signals common errors that
happen all the time. Avoid these at all cost.
You can skip information next to this icon if you’re not into it.
Don’t worry – you don’t have to be a security whiz or hot-rod
programmer to do vulnerability management.
Where to Go from Here
Check out the headings and start reading wherever it makes
sense. This book is written with a sequential logic, but if you
feel a need to express your inner Spock you can start any-
where to extract good stuff. If you want a hands-on demo or
trial version of QualysGuard – our featured vulnerability man-
agement solution – visit
www.qualys.com.
Zgłoś jeśli naruszono regulamin