19.04.2013 Views

2KKUU7ita

2KKUU7ita

2KKUU7ita

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

24<br />

Part I: Building the Foundation for Ethical Hacking<br />

New security vulnerabilities continually appear. Information systems constantly<br />

change and become more complex. New hacker exploits and security<br />

vulnerabilities are regularly uncovered. Vulnerability scanners get better and<br />

better. You’ll probably even discover new ones yourself! Security tests are a<br />

snapshot of the security posture of your systems. At any time, everything can<br />

change, especially after upgrading software, adding computer systems, or<br />

applying patches. Plan to test regularly and consistently (for example, once a<br />

month, once a quarter, or biannually). Chapter 18 covers managing security<br />

changes.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!