System Identification for Vulnerability Assessment
An independent method of taking an inventory of the devices currently attached to your network must be developed in order to adequately secure the entire network. You must know what you are defending to adequately defend it. This paper is a description of one company's journey using existing...