Research Catalog

Automated tools for testing computer system vulnerability

Title
Automated tools for testing computer system vulnerability / W. Timothy Polk.
Author
Polk, Tim, 1962-
Publication
Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology, 1992.

Available Online

https://purl.fdlp.gov/GPO/gpo103697

Details

Additional Authors
National Institute of Standards and Technology (U.S.). Computer Security Division.
Description
1 online resource.
Summary
Computer security "incidents" occur with alarming frequency. The incidents range from direct attacks by both hackers and insiders to automated attacks such as network worms. Weak system controls are frequently cited as the cause, but many of these incidents are the result of improper use of existing control mechanisms. For example, improper access control specifications for key system files could open the entire system to unauthorized access. Moreover, many computer systems are delivered with default settings that, if left unchanged, leave the system exposed. This document discusses automated tools for testing computer system vulnerability. By analyzing factors affecting the security of a computer system, a system manager can identify common vulnerabilities stemming from administrative errors. Using automated tools, this process may examine the content and protections of hundreds of files on a multi-user system and identify subtle vulnerabilities. By acting on this information, system administrators can significantly reduce their systems' security exposure. This document examines basic requirements for vulnerability testing tools and describes the different functional classes of tools. Finally, the document offers general recommendations about the selection and distribution of such tools.
Series Statement
NIST special publication ; 800-6
Uniform Title
NIST special publication ; 800-6.
Subject
  • Change detection
  • Computer security
  • Configuration review
  • Identification of vulnerabilities
  • Secure audit
  • Trojan horse detection
  • Vulnerability testing
Note
  • 1992.
  • Contributed record: Metadata reviewed, not verified. Some fields updated by batch processes.
  • Title from PDF title page.
  • Withdrawn.
Bibliography (note)
  • Includes bibliographical references.
Call Number
GPO Internet C 13.10:800-6
LCCN
GOVPUB-C13-b74b963d8667eb22c477f88bea32cc2f
OCLC
marcive927737217
Author
Polk, Tim, 1962-
Title
Automated tools for testing computer system vulnerability / W. Timothy Polk.
Publisher
Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology, 1992.
Type of Content
text
Type of Medium
computer
Type of Carrier
online resource
Series
NIST special publication ; 800-6
NIST special publication ; 800-6.
Bibliography
Includes bibliographical references.
Connect to:
https://purl.fdlp.gov/GPO/gpo103697
Indexed Term
Change detection
Computer security
Configuration review
Identification of vulnerabilities
Secure audit
Trojan horse detection
Vulnerability testing
Added Author
Polk, Tim, 1962-
National Institute of Standards and Technology (U.S.). Computer Security Division.
Other Standard Identifier
GOVPUB-C13-b74b963d8667eb22c477f88bea32cc2f
Gpo Item No.
0247 (online)
Sudoc No.
C 13.10:800-6
View in Legacy Catalog