CMU Online Digital Object Repository
Central Michigan University Scholarly & Creative Works > CMU Faculty/Staff Research > 200705, Presentation

Vulnerability Scanning: a Research Report and Best..., May 2007

Download whole document (PDF) (369.45 KB)
Title Vulnerability Scanning: a Research Report and Best Practices
Date 200705
Material Type Presentation
Creator/Author Ferrer, Daniel F., Library Systems
Additional Contributors Randall, Doug, VP Product Technology, Innovative Interfaces, Inc.
Copyright Copyright 2007 by Daniel Ferrer and Doug Randall. This material is copyrighted, and any further reproduction or distribution is prohibited without the permission of the copyright owner.
Subject Patch management; TCP wrappers; HyperText Transfer Protocol; Version rollback attacks; SSH-2; SSL certificate; Scanning vulnerabilities; Nessus; INNOPAC (Computer system) -- Security measures; Integrated library systems (Computer systems) -- Security measures; Computer viruses -- Prevention; Computer hackers;
Description Slides from a presentation to the Innovative Interface Inc User Group (IUG 15) in San Jose, California, May 2007. Discusses the use of vulnerability scanning of Innovative Interface Inc. libraries to protect servers from security attacks. Describes use of Nessus software to run vulnerability scans of such servers. This software simulates attacks to find vulnerabilities before hackers find them, enabling preemptive fixes. The presentation outlines how to go about setting up the software, the kind of reports the software producees, and the vulnerabilities that are most frequently exposed. It also provides the 10 best practices for system administrators to implement.
Language English
Show/hide left pane
Document Previous document Browse all documents of this publication Next document    Zoom in Zoom out Maximize
© 2008-2018 DL Consulting. All rights reserved. Powered by Veridian
Alert Close
Help Close
Edit Close
Add to private list Close
Move to another list Close