Show simple item record

dc.contributor.authorAnton, Philip S.
dc.contributor.authorAnderson, Robert H.
dc.contributor.authorMesic, Richard
dc.contributor.authorScheiern, Michael
dc.date.accessioned2023-10-05T10:08:59Z
dc.date.available2023-10-05T10:08:59Z
dc.date.issued2003
dc.identifierONIX_20231005_9780833035998_324
dc.identifier.urihttps://directory.doabooks.org/handle/20.500.12854/114550
dc.description.abstractUnderstanding an organization's reliance on information systems and how to mitigate the vulnerabilities of these systems can be an intimidating challenge--especially when considering less well-known weaknesses or even unknown vulnerabilities that have not yet been exploited. The authors introduce the Vulnerability Assessment and Mitigation methodology, a six-step process that uses a top-down approach to protect against future threats and system failures while mitigating current and past threats and weaknesses.
dc.languageEnglish
dc.subject.classificationthema EDItEUR::J Society and Social Sciences::JW Warfare and defenceen_US
dc.subject.classificationthema EDItEUR::W Lifestyle, Hobbies and Leisure::WG Transport: general interesten_US
dc.subject.otherTransportation Studies
dc.subject.otherPolitical Science
dc.titleFinding and Fixing Vulnerabilities in Information Systems
dc.title.alternativeThe Vulnerability Assessment and Mitigation Methodology
dc.typebook
oapen.identifier.doi10.7249/MR1601DARPA
oapen.relation.isPublishedBy47ac0b54-b121-491c-a9c8-5ca6776e27cb
oapen.relation.isbn9780833035998
oapen.relation.isbn9780833034342


Files in this item

FilesSizeFormatView

There are no files associated with this item.

This item appears in the following Collection(s)

Show simple item record