Finding and Fixing Vulnerabilities in Information Systems The Vulnerability Assessment and Mitigation Methodology

Understanding an organization's reliance on information systems and how to mitigate the vulnerabilities of these systems can be an intimidating challenge--especially when considering less well-known weaknesses or even unknown vulnerabilities that have not yet been exploited. The authors introdu...

Full description

Saved in:
Bibliographic Details
Main Author: Anton, Philip S. (auth)
Other Authors: Anderson, Robert H. (auth), Mesic, Richard (auth), Scheiern, Michael (auth)
Format: Electronic Book Chapter
Language:English
Published: RAND Corporation 2003
Subjects:
Online Access:DOAB: download the publication
DOAB: description of the publication
Tags: Add Tag
No Tags, Be the first to tag this record!

MARC

LEADER 00000naaaa2200000uu 4500
001 doab_20_500_12854_114550
005 20231005
003 oapen
006 m o d
007 cr|mn|---annan
008 20231005s2003 xx |||||o ||| 0|eng d
020 |a MR1601DARPA 
020 |a 9780833035998 
020 |a 9780833034342 
040 |a oapen  |c oapen 
024 7 |a 10.7249/MR1601DARPA  |c doi 
041 0 |a eng 
042 |a dc 
072 7 |a JW  |2 bicssc 
072 7 |a WG  |2 bicssc 
100 1 |a Anton, Philip S.  |4 auth 
700 1 |a Anderson, Robert H.  |4 auth 
700 1 |a Mesic, Richard  |4 auth 
700 1 |a Scheiern, Michael  |4 auth 
245 1 0 |a Finding and Fixing Vulnerabilities in Information Systems  |b The Vulnerability Assessment and Mitigation Methodology 
260 |b RAND Corporation  |c 2003 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
506 0 |a Open Access  |2 star  |f Unrestricted online access 
520 |a Understanding an organization's reliance on information systems and how to mitigate the vulnerabilities of these systems can be an intimidating challenge--especially when considering less well-known weaknesses or even unknown vulnerabilities that have not yet been exploited. The authors introduce the Vulnerability Assessment and Mitigation methodology, a six-step process that uses a top-down approach to protect against future threats and system failures while mitigating current and past threats and weaknesses. 
540 |a All rights reserved  |4 http://oapen.org/content/about-rights 
546 |a English 
650 7 |a Warfare & defence  |2 bicssc 
650 7 |a Transport: general interest  |2 bicssc 
653 |a Transportation Studies 
653 |a Political Science 
856 4 0 |a www.oapen.org  |u https://www.jstor.org/stable/10.7249/MR1601DARPA  |7 0  |z DOAB: download the publication 
856 4 0 |a www.oapen.org  |u https://directory.doabooks.org/handle/20.500.12854/114550  |7 0  |z DOAB: description of the publication