Results 1 to 3 of 3

Thread: Security Assessment

  1. #1
    AntiOnline Senior Member souleman's Avatar
    Join Date
    Oct 2001
    Location
    Flint, MI
    Posts
    2,883

    Security Assessment

    Well, I just liked the little pictures... Anyway, this gives a good, brief overview of the security assessment life cycle, and it has a funny little hacker dude playing witha lock. What could be better then that?

    http://common.ziffdavisinternet.com/...i=12290,00.gif
    \"Ignorance is bliss....
    but only for your enemy\"
    -- souleman

  2. #2
    Webius Designerous Indiginous
    Join Date
    Mar 2002
    Location
    South Florida
    Posts
    1,123
    Or in Microsofts case skip step two and 2a altogether. Jump strait to step 3.

  3. #3
    AntiOnline Senior Member souleman's Avatar
    Join Date
    Oct 2001
    Location
    Flint, MI
    Posts
    2,883
    Don't they skip step 4a and 4b also? They kinda do a 4a1/2 when a problem is found, pretend to fix it and get back to 3 asap....
    \"Ignorance is bliss....
    but only for your enemy\"
    -- souleman

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •