Conducting Risk Assessment for VOIP and Thin Client

From: Chris Hammer (CHammer@fcbnm.com)
Date: Wed Jun 21 2006 - 10:40:04 EDT


 Good morning,

 I have been tasked with conducting a Risk Assessment / Vulnerability
Assessment on a VOIP and Thin Client environment. Does anyone have a
good template to start with, as well as ideas as to where to start? I am
familiar with both of these technologies and understand how they work
but I by no means an expert on them. Any help would be appreciated!

Cheers!
Chris

The information in this email is confidential and may be legally
privileged. It is intended solely for the addressee. Access to this
email by anyone else is unauthorized. If you are not the intended
recipient, any disclosure, copying, distribution or any

------------------------------------------------------------------------------
This List Sponsored by: Cenzic

Concerned about Web Application Security?
Why not go with the #1 solution - Cenzic, the only one to win the Analyst's
Choice Award from eWeek. As attacks through web applications continue to rise,
you need to proactively protect your applications from hackers. Cenzic has the
most comprehensive solutions to meet your application security penetration
testing and vulnerability management needs. You have an option to go with a
managed service (Cenzic ClickToSecure) or an enterprise software
(Cenzic Hailstorm). Download FREE whitepaper on how a managed service can
help you: http://www.cenzic.com/news_events/wpappsec.php
And, now for a limited time we can do a FREE audit for you to confirm your
results from other product. Contact us at request@cenzic.com for details.
------------------------------------------------------------------------------



This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:56:08 EDT