Finding and fixing vulnerabilities in information systems : : the vulnerability assessment & mitigation methodology / / Philip S. Anton ... [et al.] ; prepared for the Defense Advanced Research Projects Agency.

Understanding an organization?s reliance on information systems and how to mitigate the vulnerabilities of these systems can be an intimidating challenge--especially when considering less well-known weaknesses or even unknown vulnerabilities that have not yet been exploited. The authors introduce th...

Full description

Saved in:
Bibliographic Details
:
TeilnehmendeR:
Year of Publication:2003
Edition:1st ed.
Language:English
Physical Description:1 online resource (145 p.)
Notes:Description based upon print version of record.
Tags: Add Tag
No Tags, Be the first to tag this record!
LEADER 01323nam a22003254a 4500
001 993628471304498
005 20200520144314.0
006 m o d |
007 cr -n---------
008 030529s2003 caua ob 000 0 eng
020 |a 0-8330-3599-1 
035 |a (CKB)111090529190274 
035 |a (EBL)197482 
035 |a (OCoLC)70732933 
035 |a (SSID)ssj0000155168 
035 |a (PQKBManifestationID)11946802 
035 |a (PQKBTitleCode)TC0000155168 
035 |a (PQKBWorkID)10099331 
035 |a (PQKB)10581966 
035 |a (Au-PeEL)EBL197482 
035 |a (CaPaEBR)ebr10056172 
035 |a (CaONFJC)MIL289776 
035 |a (MiAaPQ)EBC197482 
035 |a (EXLCZ)99111090529190274 
040 |a MiAaPQ  |b eng  |e rda  |e pn  |c MiAaPQ  |d MiAaPQ 
041 |a eng 
050 4 |a QA76.9.A25  |b F525 2003 
082 0 |a 005.8  |2 21 
245 0 0 |a Finding and fixing vulnerabilities in information systems :  |b the vulnerability assessment & mitigation methodology /  |c Philip S. Anton ... [et al.] ; prepared for the Defense Advanced Research Projects Agency. 
246 3 0 |a Vulnerability assessment & mitigation methodology 
246 3 0 |a Vulnerability assessment and mitigation methodology 
250 |a 1st ed. 
260 |a Santa Monica, CA :  |b Rand,  |c 2003. 
300 |a 1 online resource (145 p.) 
336 |a text  |b txt 
337 |a computer  |b c 
338 |a online resource  |b cr 
500 |a Description based upon print version of record. 
505 0 |a Cover; PREFACE; CONTENTS; FIGURES; TABLES; SUMMARY; ACKNOWLEDGMENTS; ACRONYMS; Chapter One INTRODUCTION; WHO SHOULD USE THE VAM METHODOLOGY?; PREVIOUS RESEARCH; STRUCTURE OF THIS REPORT; Chapter Two CONCEPTS AND DEFINITIONS; SECURITY; INFORMATION SYSTEMS; SYSTEM OBJECT TYPES; ATTRIBUTES AS SOURCES OF VULNERABILITIES; Chapter Three VAM METHODOLOGY AND OTHER DoD PRACTICES IN RISK ASSESSMENT; OVERVIEW OF THE VAM METHODOLOGY; OTHER DoD VULNERABILITY ASSESSMENT METHODOLOGIES; OCTAVE; ISO/IEC 15408: Common Criteria; ISO/IEC 17799: Code of Practice for Information Security Management 
505 8 |a Chapter Four VULNERABILITY ATTRIBUTES OF SYSTEM OBJECTSVULNERABILITY ATTRIBUTE CATEGORIES; A VULNERABILITY CHECKLIST AND EXAMPLE; DESCRIPTION OF VULNERABILITY ATTRIBUTES; HOW VULNERABILITY PROPERTIES COMBINE IN COMMON THREATS; Chapter Five DIRECT AND INDIRECT SECURITY TECHNIQUES; SECURITY TECHNIQUE CATEGORIES AND EXAMPLES; HOW SECURITY TECHNIQUES COMBINE IN COMMON SECURITY APPROACHES; Chapter Six GENERATING SECURITY OPTIONS FOR VULNERABILITIES; MAPPING VULNERABILITIES TO SECURITY TECHNIQUES; REFINING THE SECURITY SUGGESTIONS; EXAMPLE SECURITY OPTIONS ARISING FROM THE USE OF THE METHODOLOGY 
505 8 |a Chapter Seven AUTOMATING AND EXECUTING THE METHODOLOGY: A SPREADSHEET TOOLINITIAL STEPS PERFORMED MANUALLY; VULNERABILITIES GUIDED BY AND RECORDED ON A FORM; THE RISK ASSESSMENT AND MITIGATION SELECTION SPREADSHEET; Chapter Eight NEXT STEPS AND DISCUSSION; FUTURE CHALLENGES AND OPPORTUNITIES; WHAT VULNERABILITY WILL FAIL OR BE ATTACKED NEXT?; USABILITY ISSUES; WHY PERFORM SECURITY ASSESSMENTS?; Chapter Nine SUMMARY AND CONCLUSIONS; Appendix VULNERABILITY TO MITIGATION MAP VALUES; BIBLIOGRAPHY 
520 |a Understanding an organization?s reliance on information systems and how to mitigate the vulnerabilities of these systems can be an intimidating challenge--especially when considering less well-known weaknesses or even unknown vulnerabilities that have not yet been exploited. The authors introduce the Vulnerability Assessment and Mitigation methodology, a six-step process that uses a top-down approach to protect against future threats and system failures while mitigating current and past threats and weaknesses. 
546 |a English 
504 |a Includes bibliographical references. 
650 0 |a Computer security. 
650 0 |a Data protection. 
650 0 |a Risk assessment. 
776 |z 0-8330-3434-0 
710 1 |a United States.  |b Defense Advanced Research Projects Agency. 
700 1 |a Anton, Philip S. 
906 |a BOOK 
ADM |b 2024-08-03 14:06:42 Europe/Vienna  |f system  |c marc21  |a 2012-02-26 00:12:32 Europe/Vienna  |g false 
AVE |i DOAB Directory of Open Access Books  |P DOAB Directory of Open Access Books  |x https://eu02.alma.exlibrisgroup.com/view/uresolver/43ACC_OEAW/openurl?u.ignore_date_coverage=true&portfolio_pid=5350461200004498&Force_direct=true  |Z 5350461200004498  |b Available  |8 5350461200004498