Finding and Fixing Vulnerabilities in Information Systems The Vulnerability Assessment and Mitigation Methodology

Understanding an organization's reliance on information systems and how to mitigate the vulnerabilities of these systems can be an intimidating challenge--especially when considering less well-known weaknesses or even unknown vulnerabilities that have not yet been exploited. The authors introdu...

Szczegółowa specyfikacja

Zapisane w:
Opis bibliograficzny
1. autor: Anton, Philip S. (auth)
Kolejni autorzy: Anderson, Robert H. (auth), Mesic, Richard (auth), Scheiern, Michael (auth)
Format: Elektroniczne Rozdział
Język:angielski
Wydane: RAND Corporation 2003
Hasła przedmiotowe:
Dostęp online:DOAB: download the publication
DOAB: description of the publication
Etykiety: Dodaj etykietę
Nie ma etykietki, Dołącz pierwszą etykiete!
Opis
Streszczenie:Understanding an organization's reliance on information systems and how to mitigate the vulnerabilities of these systems can be an intimidating challenge--especially when considering less well-known weaknesses or even unknown vulnerabilities that have not yet been exploited. The authors introduce the Vulnerability Assessment and Mitigation methodology, a six-step process that uses a top-down approach to protect against future threats and system failures while mitigating current and past threats and weaknesses.
ISBN:MR1601DARPA
9780833035998
9780833034342
Ograniczenie dostępu:Open Access