Hands-on Lab 5 - Vulnerability Assessment


(DUE November 10, 2005 by midnight EST) "An attacker need only detect one weakness to breach your network and take control; in other words, every potential security weakness must be identified — and secured — in order to protect your company's digital assets." [eEye Digital Security - Retina® Network Security Scanner "One step that can immediately improve information security efficiency is to conduct routine security assessments." [The nuts and bolts of a security assessment


Click here to return to Wayne's World's homepage: return to Wayne's World


written by Wayne Summers summers_wayne@ColumbusState.edu