Skip navigation
Please use this identifier to cite or link to this item: https://libeldoc.bsuir.by/handle/123456789/31942
Full metadata record
DC FieldValueLanguage
dc.contributor.authorJoe-Madu, S.-
dc.contributor.authorPrudnik, A. M.-
dc.date.accessioned2018-06-12T11:41:08Z-
dc.date.available2018-06-12T11:41:08Z-
dc.date.issued2018-
dc.identifier.citationJoe-Madu, S. Implementation of the vulnerability management program using project approach / S. Joe-Madu, A. M. Prudnik // Технические средства защиты информации : тезисы докладов ХVI Белорусско-российской научно – технической конференции, Минск, 5 июня 2018 г. – Минск: БГУИР, 2017. – С. 9.ru_RU
dc.identifier.urihttps://libeldoc.bsuir.by/handle/123456789/31942-
dc.description.abstractA vulnerability is defined in the standard as “A weakness of an asset or group of assets that can be exploited by one or more threats” [1]. IT security regulations increasingly are the norm demonstrating a standard of care in protecting sensitive data. To serve this standard, several regulatory bodies have mandated the creation of vulnerability management programs. Examples include: the Payment Card Industry Data Security Standard (PCI DSS), Health Insurance Portability and Accountability Act (HIPAA), and Federal Energy Regulation Committee (FERC)ru_RU
dc.language.isoenru_RU
dc.publisherБГУИРru_RU
dc.subjectматериалы конференцийru_RU
dc.titleImplementation of the vulnerability management program using project approachru_RU
dc.typeСтатьяru_RU
Appears in Collections:ТСЗИ 2018

Files in This Item:
File Description SizeFormat 
Joe-Madu_Implementation.pdf121.04 kBAdobe PDFView/Open
Show simple item record Google Scholar

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.