Design and Deployment of a Rapid Response Security Vulnerability Scanning Infrastructure
A large research university presents a formidable challenge to computer security professionals. Among the hazards are a completely porous, non firewalled border and decentralized administration of computers. Considerable emphasis and effort is hence placed on proactive vulnerability scanning in an...