Finding and Fixing Vulnerabilities in Information Systems The Vulnerability Assessment and Mitigation Methodology
Understanding an organization's reliance on information systems and how to mitigate the vulnerabilities of these systems can be an intimidating challenge--especially when considering less well-known weaknesses or even unknown vulnerabilities that have not yet been exploited. The authors introdu...
Saved in:
Main Author: | |
---|---|
Other Authors: | , , |
Format: | Electronic Book Chapter |
Language: | English |
Published: |
RAND Corporation
2003
|
Subjects: | |
Online Access: | DOAB: download the publication DOAB: description of the publication |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
MARC
LEADER | 00000naaaa2200000uu 4500 | ||
---|---|---|---|
001 | doab_20_500_12854_114550 | ||
005 | 20231005 | ||
003 | oapen | ||
006 | m o d | ||
007 | cr|mn|---annan | ||
008 | 20231005s2003 xx |||||o ||| 0|eng d | ||
020 | |a MR1601DARPA | ||
020 | |a 9780833035998 | ||
020 | |a 9780833034342 | ||
040 | |a oapen |c oapen | ||
024 | 7 | |a 10.7249/MR1601DARPA |c doi | |
041 | 0 | |a eng | |
042 | |a dc | ||
072 | 7 | |a JW |2 bicssc | |
072 | 7 | |a WG |2 bicssc | |
100 | 1 | |a Anton, Philip S. |4 auth | |
700 | 1 | |a Anderson, Robert H. |4 auth | |
700 | 1 | |a Mesic, Richard |4 auth | |
700 | 1 | |a Scheiern, Michael |4 auth | |
245 | 1 | 0 | |a Finding and Fixing Vulnerabilities in Information Systems |b The Vulnerability Assessment and Mitigation Methodology |
260 | |b RAND Corporation |c 2003 | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
506 | 0 | |a Open Access |2 star |f Unrestricted online access | |
520 | |a Understanding an organization's reliance on information systems and how to mitigate the vulnerabilities of these systems can be an intimidating challenge--especially when considering less well-known weaknesses or even unknown vulnerabilities that have not yet been exploited. The authors introduce the Vulnerability Assessment and Mitigation methodology, a six-step process that uses a top-down approach to protect against future threats and system failures while mitigating current and past threats and weaknesses. | ||
540 | |a All rights reserved |4 http://oapen.org/content/about-rights | ||
546 | |a English | ||
650 | 7 | |a Warfare & defence |2 bicssc | |
650 | 7 | |a Transport: general interest |2 bicssc | |
653 | |a Transportation Studies | ||
653 | |a Political Science | ||
856 | 4 | 0 | |a www.oapen.org |u https://www.jstor.org/stable/10.7249/MR1601DARPA |7 0 |z DOAB: download the publication |
856 | 4 | 0 | |a www.oapen.org |u https://directory.doabooks.org/handle/20.500.12854/114550 |7 0 |z DOAB: description of the publication |