Loading…

Managing security vulnerabilities in a networked world

Vulnerability management process is a process by which organizations can incorporate existing security applications and investments into an on-going, operations-based process for addressing vulnerability. Security policy should be a living document outlining the organization's security objectiv...

Full description

Saved in:
Bibliographic Details
Published in:Journal of digital imaging 1998-08, Vol.11 (3 Suppl 1), p.216-218
Main Authors: Rudd, A, McFarland, J, Olsen, S
Format: Article
Language:English
Subjects:
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:Vulnerability management process is a process by which organizations can incorporate existing security applications and investments into an on-going, operations-based process for addressing vulnerability. Security policy should be a living document outlining the organization's security objectives and documenting the resources to be protected. In addition, security devices should be deployed controlling access to network resources. Organizations should monitor their networks for violations of security policy including on-going testing of network resources using automated tools to look for vulnerabilities. Organizations should use security tools that have security vulnerability databases.
ISSN:0897-1889
1618-727X
DOI:10.1007/bf03168315