資料來源: Google Book
Finding and fixing vulnerabilities in information systems :the vulnerability assessment & mitigation methodology
- 其他作者: Antón, Philip S. , United States.
- 出版: Santa Monica, CA : Rand 2003.
- 稽核項: 1 online resource (xxvi, 117 pages) :illustrations.
- 叢書名: Rand note ;MR-1601-DARPA
- 標題: SecurityGeneral. , Electronic books. , TRANSPORTATION , Risk assessment. , COMPUTERS Internet -- Security. , Computer security. , COMPUTERS , InternetSecurity. , Computer Science. , Engineering & Applied Sciences. , COMPUTERS Networking -- Security. , COMPUTERS Security -- General. , NetworkingSecurity. , TRANSPORTATION General. , Data protection. , General.
- ISBN: 0833034340 , 9780833034342
- 試查全文@TNUA:
- 附註: Includes bibliographical references. Introduction -- Concepts and definitions -- VAM methodology and other DoD practices in risk assessment -- Vulnerability attributes of system objects -- Direct and indirect security techniques -- Generating security options for vulnerabilities -- Automating and executing the methodology: a spreadsheet tool -- Next steps and discussion -- Summary and conclusions -- Appendix: Vulnerability to mitigation map values.
- 摘要: Understanding an organization's reliance on information systems and how to mitigate the vulnerabilities of these systems can be an intimidating challenge--especially when considering less well-known weaknesses or even unknown vulnerabilities that have not yet been exploited. The authors, understanding the risks posed by new kinds of information security threats, build on previous RAND mitigation techniques by introducing the Vulnerability Assessment and Mitigation (VAM) methodology. The six-step procedure uses a top-down approach to protect against future threats and system failures while mitigating current and past threats and weaknesses. The authors lead evaluators through the procedure of classifying vulnerabilities in their systems' physical, cyber, human/social, and infrastructure elements, and identifying which security techniques can be relevant for these vulnerabilities. The authors also use VAM to break down information compromises into five fundamental components of attack or failure: knowledge, access, target vulnerability, non-retribution, and assessment. In addition, a new automated tool implemented as an Excel spreadsheet is discussed; this tool greatly simplifies using the methodology and emphasizes analysis on cautions, risks, and barriers.
- 電子資源: https://dbs.tnua.edu.tw/login?url=https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=105337
- 系統號: 005307733
- 資料類型: 電子書
- 讀者標籤: 需登入
- 引用網址: 複製連結
Understanding an organization's reliance on information systems and how to mitigate the vulnerabilities of these systems can be an intimidating challenge--especially when considering less well-known weaknesses or even unknown vulnerabilities that have not yet been exploited. The authors introduce the Vulnerability Assessment and Mitigation methodology, a six-step process that uses a top-down approach to protect against future threats and system failures while mitigating current and past threats and weaknesses.
來源: Google Book
來源: Google Book
評分