Security Basics mailing list archives
Re: Justifying the spend on a vulnerability scanner
From: "Kenzo" <kenzo_chin () hotmail com>
Date: Mon, 10 Mar 2003 12:20:39 -0600
I would ask permission from your manager in writing do to some pen testing. run things like Nessus and Nmap against your system and show him/her the holes. ----- Original Message ----- From: "JM" <jamesmcgeeiom () onetel net uk> To: <security-basics () securityfocus com> Sent: Monday, March 10, 2003 10:31 AM Subject: Justifying the spend on a vulnerability scanner
As the subject says, this is what I have got to do. I could dream up loads of examples of; if we dont detect a code read virus and we get it, then it will knock out our webservers and others until we fix it. if we have open null shares on the network, and unrestricted access to remote registries people can do what they want....... But does anyone have any thoughts to share, on how I can successfully convince my management that the spend on a vulnerability scanner is worthwhile. Thanks in advance JM
Current thread:
- Justifying the spend on a vulnerability scanner JM (Mar 10)
- Re: Justifying the spend on a vulnerability scanner Vlad Tsyrklevich (Mar 11)
- Re: Justifying the spend on a vulnerability scanner Gene Yoo (Mar 11)
- Re: Justifying the spend on a vulnerability scanner Kenzo (Mar 11)
- Re: Justifying the spend on a vulnerability scanner Pierre A. Cadieux (Mar 12)
- <Possible follow-ups>
- RE: Justifying the spend on a vulnerability scanner JM (Mar 11)
- Re: Justifying the spend on a vulnerability scanner Gerhard Rickert (Mar 12)
- RE: Justifying the spend on a vulnerability scanner mhunt (Mar 21)
- Re: Justifying the spend on a vulnerability scanner Gerhard Rickert (Mar 12)
- Re: Justifying the spend on a vulnerability scanner Chris Berry (Mar 11)
- RE: Justifying the spend on a vulnerability scanner David Gillett (Mar 12)
- Re: Justifying the spend on a vulnerability scanner Gerhard Rickert (Mar 13)
- Re: Justifying the spend on a vulnerability scanner Gerhard Rickert (Mar 13)
- RE: Justifying the spend on a vulnerability scanner David Gillett (Mar 12)
- Re: Justifying the spend on a vulnerability scanner David Vertie (Mar 13)
- RE: Justifying the spend on a vulnerability scanner Buyer Jr, David (Mar 24)