Finding and Fixing Vulnerabilities in Information Systems
The Vulnerability Assessment and Mitigation Methodology
dc.contributor.author | Anton, Philip S. | |
dc.contributor.author | Anderson, Robert H. | |
dc.contributor.author | Mesic, Richard | |
dc.contributor.author | Scheiern, Michael | |
dc.date.accessioned | 2023-10-05T10:08:59Z | |
dc.date.available | 2023-10-05T10:08:59Z | |
dc.date.issued | 2003 | |
dc.identifier | ONIX_20231005_9780833035998_324 | |
dc.identifier.uri | https://directory.doabooks.org/handle/20.500.12854/114550 | |
dc.description.abstract | Understanding an organization's reliance on information systems and how to mitigate the vulnerabilities of these systems can be an intimidating challenge--especially when considering less well-known weaknesses or even unknown vulnerabilities that have not yet been exploited. The authors introduce the Vulnerability Assessment and Mitigation methodology, a six-step process that uses a top-down approach to protect against future threats and system failures while mitigating current and past threats and weaknesses. | |
dc.language | English | |
dc.subject.classification | thema EDItEUR::J Society and Social Sciences::JW Warfare and defence | en_US |
dc.subject.classification | thema EDItEUR::W Lifestyle, Hobbies and Leisure::WG Transport: general interest | en_US |
dc.subject.other | Transportation Studies | |
dc.subject.other | Political Science | |
dc.title | Finding and Fixing Vulnerabilities in Information Systems | |
dc.title.alternative | The Vulnerability Assessment and Mitigation Methodology | |
dc.type | book | |
oapen.identifier.doi | 10.7249/MR1601DARPA | |
oapen.relation.isPublishedBy | 47ac0b54-b121-491c-a9c8-5ca6776e27cb | |
oapen.relation.isbn | 9780833035998 | |
oapen.relation.isbn | 9780833034342 |
Files in this item
Files | Size | Format | View |
---|---|---|---|
There are no files associated with this item. |