Cargando…

Finding and fixing vulnerabilities in information systems : the vulnerability assessment & mitigation methodology /

Understanding an organization's reliance on information systems and how to mitigate the vulnerabilities of these systems can be an intimidating challenge--especially when considering less well-known weaknesses or even unknown vulnerabilities that have not yet been exploited. The authors, unders...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor Corporativo: United States. Defense Advanced Research Projects Agency
Otros Autores: Antón, Philip S.
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Santa Monica, CA : Rand, 2003.
Colección:Rand note ; MR-1601-DARPA.
Temas:
Acceso en línea:Texto completo
Tabla de Contenidos:
  • Introduction
  • Concepts and definitions
  • VAM methodology and other DoD practices in risk assessment
  • Vulnerability attributes of system objects
  • Direct and indirect security techniques
  • Generating security options for vulnerabilities
  • Automating and executing the methodology: a spreadsheet tool
  • Next steps and discussion
  • Summary and conclusions
  • Appendix: Vulnerability to mitigation map values.