ix
Acknowledgments
People who take sole credit for any task completed or process “developed”
have forgotten where they came from and who helped them get to where
they are now. When discussing network vulnerability assessment, many people
do not want to have their names associated in any way with the process.
However, this is one of those tasks that needs to be done, and the best way
to do it is to make the task as simple as possible. Over the years we have
been able to learn the process of network vulnerability assessment from the
best teachers around, our peers.
First on our list of acknowledgments is our mentor and friend, John O’Leary,
the Director of the Computer Security Institute’s Education Resource Center.
One of the first training sessions I attended as a neophyte security professional
was John’s “Computer and Network Security” class. This class laid the foun-
dation for my understanding that a network is a scary place, but that with
proper review and attention it can serve us well.
The next two people who need to be acknowledged are Dr. Dan Webb
and Dr. Peter Stephenson. Dr. Dan showed me the fundamentals of vulnera-
bility assessment, and Dr. Stephenson helped me fine-tune the process we
worked on together for just over two years. Dr. Stephenson’s books on
computer forensics are used as industry benchmarks for all security profes-
sionals. His willingness to share ideas and his findings has helped move our
profession forward.
Michael Cannon, Larry Degg, Gene Traylor, and John Riske helped me
begin the process of assessing network vulnerabilities. We worked together
for seven years and drew up the prototype for a business-based information
security program.
Justin would like to acknowledge his dad, for all his loving support and
the opportunity to be part of this industry; Dr. Peter Stephenson, for patiently
teaching him how to correctly perform a vulnerability assessment; Paul Immo
and Marc Harwin for their friendship and support; and Julie, for being the
love of his life and taking care of him so well.
x Managing Network Vulnerability Assessment
Who can leave out their publisher? Certainly not us! Rich O’Hanley has
taken the time to discuss security issues with numerous organizations to
understand what their needs are and then presented these findings to us. A
great deal of our work here is a direct result of what Rich discovered that
the industry wanted. Rich O’Hanley, not only the world’s best editor and task
master, but a good friend and source of knowledge. Thanks Rich!
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
13.58.113.193