https://libeldoc.bsuir.by/handle/123456789/31942
Title: | Implementation of the vulnerability management program using project approach |
Authors: | Joe-Madu, S. Prudnik, A. M. |
Keywords: | материалы конференций |
Issue Date: | 2018 |
Publisher: | БГУИР |
Citation: | Joe-Madu, S. Implementation of the vulnerability management program using project approach / S. Joe-Madu, A. M. Prudnik // Технические средства защиты информации : тезисы докладов ХVI Белорусско-российской научно – технической конференции, Минск, 5 июня 2018 г. – Минск: БГУИР, 2017. – С. 9. |
Abstract: | A vulnerability is defined in the standard as “A weakness of an asset or group of assets that can be exploited by one or more threats” [1]. IT security regulations increasingly are the norm demonstrating a standard of care in protecting sensitive data. To serve this standard, several regulatory bodies have mandated the creation of vulnerability management programs. Examples include: the Payment Card Industry Data Security Standard (PCI DSS), Health Insurance Portability and Accountability Act (HIPAA), and Federal Energy Regulation Committee (FERC) |
URI: | https://libeldoc.bsuir.by/handle/123456789/31942 |
Appears in Collections: | ТСЗИ 2018 |
File | Description | Size | Format | |
---|---|---|---|---|
Joe-Madu_Implementation.pdf | 121.04 kB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.