Vulnerability Scanning: a Research Report and Best..., May 2007

Download whole document (PDF) (369.45 KB)

Contents

Metadata

Title
Vulnerability Scanning: a Research Report and Best Practices
Date
200705
Material Type
Presentation
Creator/Author
Ferrer, Daniel F., Library Systems
Additional Contributors
Randall, Doug, VP Product Technology, Innovative Interfaces, Inc.
Copyright
Copyright 2007 by Daniel Ferrer and Doug Randall. This material is copyrighted, and any further reproduction or distribution is prohibited without the permission of the copyright owner.
Subject
Patch management; TCP wrappers; HyperText Transfer Protocol; Version rollback attacks; SSH-2; SSL certificate; Scanning vulnerabilities; Nessus; INNOPAC (Computer system) -- Security measures; Integrated library systems (Computer systems) -- Security measures; Computer viruses -- Prevention; Computer hackers;
Description
Slides from a presentation to the Innovative Interface Inc User Group (IUG 15) in San Jose, California, May 2007. Discusses the use of vulnerability scanning of Innovative Interface Inc. libraries to protect servers from security attacks. Describes use of Nessus software to run vulnerability scans of such servers. This software simulates attacks to find vulnerabilities before hackers find them, enabling preemptive fixes. The presentation outlines how to go about setting up the software, the kind of reports the software producees, and the vulnerabilities that are most frequently exposed. It also provides the 10 best practices for system administrators to implement.
Language
English
Select a page in the document viewer.

Text

Text

Comments

Tags