86
Chapter 9. Vulnerability Assessment
9.3.5. Anticipating Your Future Needs
Depending upon your target and resources, there are any number of tools available. There are tools for
wireless networks, Novell networks, UNIX systems, Linux systems, and more. Another essential part
of performing assessments may include reviewing physical security as well as war dialing   dialing
numbers and extensions enterprise wide for modem access to your network. New concepts, such as
war walking   scanning the perimeter of your enterprise's physical structures for wireless network
access   are some emerging concepts that you can investigate and, if needed, incorporate in your
assessments. Imagination and exposure are the only limits of planning and conducting vulnerability
assessments.






footer




 

 

 

 

 Home | About Us | Network | Services | Support | FAQ | Control Panel | Order Online | Sitemap | Contact

web hosting comparison

 

Our partners: PHP: Hypertext Preprocessor Best Web Hosting Java Web Hosting Inexpensive Web Hosting  Jsp Web Hosting

Cheapest Web Hosting Jsp Hosting Cheap Hosting

Visionwebhosting.net Business web hosting division of Web Design Plus. All rights reserved