Finding and fixing vulnerabilities in information systems the vulnerability assessment & mitigation methodology

Understanding an organization's reliance on information systems and how to mitigate the vulnerabilities of these systems can be an intimidating challenge--especially when considering less well-known weaknesses or even unknown vulnerabilities that have not yet been exploited. The authors, unders...

Descripción completa

Detalles Bibliográficos
Autor Corporativo: United States. Defense Advanced Research Projects Agency (-)
Otros Autores: Antón, Philip S. (-)
Formato: Libro electrónico
Idioma:Inglés
Publicado: Santa Monica, CA : Rand 2003.
Colección:JSTOR Open Access monographs.
Rand note ; MR-1601-DARPA.
Acceso en línea:Conectar con la versión electrónica
Ver en Universidad de Navarra:https://innopac.unav.es/record=b37557749*spi
Tabla de Contenidos:
  • Introduction
  • Concepts and definitions
  • VAM methodology and other DoD practices in risk assessment
  • Vulnerability attributes of system objects
  • Direct and indirect security techniques
  • Generating security options for vulnerabilities
  • Automating and executing the methodology: a spreadsheet tool
  • Next steps and discussion
  • Summary and conclusions
  • Appendix: Vulnerability to mitigation map values.