Loading…
Managing security vulnerabilities in a networked world
Vulnerability management process is a process by which organizations can incorporate existing security applications and investments into an on-going, operations-based process for addressing vulnerability. Security policy should be a living document outlining the organization's security objectiv...
Saved in:
Published in: | Journal of digital imaging 1998-08, Vol.11 (3 Suppl 1), p.216-218 |
---|---|
Main Authors: | , , |
Format: | Article |
Language: | English |
Subjects: | |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | Vulnerability management process is a process by which organizations can incorporate existing security applications and investments into an on-going, operations-based process for addressing vulnerability. Security policy should be a living document outlining the organization's security objectives and documenting the resources to be protected. In addition, security devices should be deployed controlling access to network resources. Organizations should monitor their networks for violations of security policy including on-going testing of network resources using automated tools to look for vulnerabilities. Organizations should use security tools that have security vulnerability databases. |
---|---|
ISSN: | 0897-1889 1618-727X |
DOI: | 10.1007/bf03168315 |