System Identification for Vulnerability Assessment

An independent method of taking an inventory of the devices currently attached to your network must be developed in order to adequately secure the entire network. You must know what you are defending to adequately defend it. This paper is a description of one company's journey using existing...
Michael Harris
September 19, 2001

All papers are copyrighted. No re-posting of papers is permitted