Home page logo

basics logo Security Basics mailing list archives

Possibly a different methodology for network testing
From: "Steve Armstrong" <stevearmstrong () logicallysecure com>
Date: Sat, 22 Jul 2006 00:55:19 +0100

Thanks to everyone who pointed out the various Methodologies as I looked
for crossover from what I believe may be a different/alternate method of
undertaking testing.
I have thrown together some bits on how I believe a Vulnerability test
should be undertaken, ensuring that the risks are assessed based upon
the network configuration, data movement profile and basic design of why
the network exists at all.
I still believe it is different to the OSSTMM, OWASP and NSA based
methodologies, and if I get a confirmation from these lists that my
thinking is correct, I will develop this further, with diagrams, flow
charts and templates.
I have derived this not because I believe these methodologies are
lacking, but that I believe they fulfil different needs.
Anyway , please let me know your thoughts, public or otherwise.
Yes I understand there is not much meat on it, but I am still confirming
if my thoughts are different from other methodologies.
Steve A
Thank you for all your time and help.
The links are to my forum with both a Mind map and a word document.  The
mind map software is open source and can be obtained from here:

This list is sponsored by: Norwich University

The NSA has designated Norwich University a center of Academic Excellence
in Information Security. Our program offers unparalleled Infosec management
education and the case study affords you unmatched consulting experience.
Using interactive e-Learning technology, you can earn this esteemed degree,
without disrupting your career or home life.


  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]