Hinweis: Um die korrekte Darstellung der Seite zu erhalten, müssen Sie beim Drucken die Hintergrundgrafiken erlauben.

Finding and fixing vulnerabilities in information systems: the vulnerability assessment & mitigation methodology

Title (alternative):
Vulnerability assessment and mitigation methodology
Vulnerability assessment & mitigation methodology
Object category:
Elektronische Ressource
Providing institution:
Forschungsbibliothek Gotha
Publisher:
Rand
Ort:
Santa Monica, CA
Date:
2003
Language:
Englisch
Abstract:
Understanding an organization's reliance on information systems and how to mitigate the vulnerabilities of these systems can be an intimidating challenge--especially when considering less well-known weaknesses or even unknown vulnerabilities that have not yet been exploited. The authors, understanding the risks posed by new kinds of information security threats, build on previous RAND mitigation techniques by introducing the Vulnerability Assessment and Mitigation (VAM) methodology. The six-step procedure uses a top-down approach to protect against future threats and system failures while mitigating current and past threats and weaknesses. The authors lead evaluators through the procedure of classifying vulnerabilities in their systems' physical, cyber, human/social, and infrastructure elements, and identifying which security techniques can be relevant for these vulnerabilities. The authors also use VAM to break down information compromises into five fundamental components of attack or failure: knowledge, access, target vulnerability, non-retribution, and assessment. In addition, a new automated tool implemented as an Excel spreadsheet is discussed; this tool greatly simplifies using the methodology and emphasizes analysis on cautions, risks, and barriers
Understanding an organization's reliance on information systems and how to mitigate the vulnerabilities of these systems can be an intimidating challenge--especially when considering less well-known weaknesses or even unknown vulnerabilities that have not yet been exploited. The authors, understanding the risks posed by new kinds of information security threats, build on previous RAND mitigation techniques by introducing the Vulnerability Assessment and Mitigation (VAM) methodology. The six-step procedure uses a top-down approach to protect against future threats and system failures while mitigating current and past threats and weaknesses. The authors lead evaluators through the procedure of classifying vulnerabilities in their systems' physical, cyber, human/social, and infrastructure elements, and identifying which security techniques can be relevant for these vulnerabilities. The authors also use VAM to break down information compromises into five fundamental components of attack or failure: knowledge, access, target vulnerability, non-retribution, and assessment. In addition, a new automated tool implemented as an Excel spreadsheet is discussed; this tool greatly simplifies using the methodology and emphasizes analysis on cautions, risks, and barriers
Object text:
Philip S. Anton [and others] ; prepared for the Defense Advanced Research Projects Agency
Includes bibliographical references
Created:
2023-04-13
Last changed:
2019-10-11
Added to portal:
2023-04-13

Ähnliche Objekte

Entdecken Sie ähnliche Objekte. Über die Datenfelder können Sie die Objekte auswählen, die Sie interessieren. Sie können Ihre Suchfilter beibehalten oder deaktivieren.


Suchfilter berücksichtigen