際際滷

際際滷Share a Scribd company logo
Vulnerability Assessment: The Missing Manual for the Missing Link
Contents
Introduction
Chapter 1 - What are VAs And What are They Not?
Chapter 2 - The Purpose of VAs
Chapter 3 - How to Do Effective VAs
Chapter 4 - Who Should Do the VA?
Chapter 5 - Brainstorming and Creativity in VAs
Chapter 6 - The VA Report
Chapter 7 - Cognitive Dissonance & Intellectual Humility
Chapter 8 - Sham Rigor & The Fear of VAs
Chapter 9 - Security Culture & Security Theater
Chapter 10 - Security Metrics, the Fallacy of Precision, & Marginal Analysis
Chapter 11 - Insider Threat Mitigation
Chapter 12 - Security Reasoning Errors
Chapter 13 - Attacks on Security Hardware
Chapter 14 - Other Security Tips
Appendix - Security Maxims
Available as a book or ebook at: https://www.amazon.com/dp/B08C9D73Z9

More Related Content

Vulnerability Assessment: The Missing Manual for the Missing Link

  • 1. Vulnerability Assessment: The Missing Manual for the Missing Link Contents Introduction Chapter 1 - What are VAs And What are They Not? Chapter 2 - The Purpose of VAs Chapter 3 - How to Do Effective VAs Chapter 4 - Who Should Do the VA? Chapter 5 - Brainstorming and Creativity in VAs Chapter 6 - The VA Report Chapter 7 - Cognitive Dissonance & Intellectual Humility Chapter 8 - Sham Rigor & The Fear of VAs Chapter 9 - Security Culture & Security Theater Chapter 10 - Security Metrics, the Fallacy of Precision, & Marginal Analysis Chapter 11 - Insider Threat Mitigation Chapter 12 - Security Reasoning Errors Chapter 13 - Attacks on Security Hardware Chapter 14 - Other Security Tips Appendix - Security Maxims Available as a book or ebook at: https://www.amazon.com/dp/B08C9D73Z9