DC Field | Value | Language |
dc.contributor.author | Joe-Madu, S. | - |
dc.contributor.author | Prudnik, A. M. | - |
dc.date.accessioned | 2018-06-12T11:41:08Z | - |
dc.date.available | 2018-06-12T11:41:08Z | - |
dc.date.issued | 2018 | - |
dc.identifier.citation | Joe-Madu, S. Implementation of the vulnerability management program using project approach / S. Joe-Madu, A. M. Prudnik // Технические средства защиты информации : тезисы докладов ХVI Белорусско-российской научно – технической конференции, Минск, 5 июня 2018 г. – Минск: БГУИР, 2017. – С. 9. | ru_RU |
dc.identifier.uri | https://libeldoc.bsuir.by/handle/123456789/31942 | - |
dc.description.abstract | A vulnerability is defined in the standard as “A weakness of an asset or group of assets that can be
exploited by one or more threats” [1]. IT security regulations increasingly are the norm demonstrating
a standard of care in protecting sensitive data. To serve this standard, several regulatory bodies have
mandated the creation of vulnerability management programs. Examples include: the Payment Card
Industry Data Security Standard (PCI DSS), Health Insurance Portability and Accountability Act (HIPAA),
and Federal Energy Regulation Committee (FERC) | ru_RU |
dc.language.iso | en | ru_RU |
dc.publisher | БГУИР | ru_RU |
dc.subject | материалы конференций | ru_RU |
dc.title | Implementation of the vulnerability management program using project approach | ru_RU |
dc.type | Статья | ru_RU |
Appears in Collections: | ТСЗИ 2018
|