Finding and fixing vulnerabilities in information systems the vulnerability assessment & mitigation methodology

Understanding an organization?s reliance on information systems and how to mitigate the vulnerabilities of these systems can be an intimidating challenge--especially when considering less well-known weaknesses or even unknown vulnerabilities that have not yet been exploited. The authors introduce th...

Descripción completa

Detalles Bibliográficos
Autor Corporativo: United States. Defense Advanced Research Projects Agency (-)
Otros Autores: Anton, Philip S. (-)
Formato: Libro electrónico
Idioma:Inglés
Publicado: Santa Monica, CA : Rand 2003.
Edición:1st ed
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009426437106719
Descripción
Sumario:Understanding an organization?s reliance on information systems and how to mitigate the vulnerabilities of these systems can be an intimidating challenge--especially when considering less well-known weaknesses or even unknown vulnerabilities that have not yet been exploited. The authors introduce the Vulnerability Assessment and Mitigation methodology, a six-step process that uses a top-down approach to protect against future threats and system failures while mitigating current and past threats and weaknesses.
Notas:Description based upon print version of record.
Descripción Física:1 online resource (145 p.)
Bibliografía:Includes bibliographical references.
ISBN:9780833035998