Skip navigation
Please use this identifier to cite or link to this item: https://libeldoc.bsuir.by/handle/123456789/31942
Title: Implementation of the vulnerability management program using project approach
Authors: Joe-Madu, S.
Prudnik, A. M.
Keywords: материалы конференций
Issue Date: 2018
Publisher: БГУИР
Citation: Joe-Madu, S. Implementation of the vulnerability management program using project approach / S. Joe-Madu, A. M. Prudnik // Технические средства защиты информации : тезисы докладов ХVI Белорусско-российской научно – технической конференции, Минск, 5 июня 2018 г. – Минск: БГУИР, 2017. – С. 9.
Abstract: A vulnerability is defined in the standard as “A weakness of an asset or group of assets that can be exploited by one or more threats” [1]. IT security regulations increasingly are the norm demonstrating a standard of care in protecting sensitive data. To serve this standard, several regulatory bodies have mandated the creation of vulnerability management programs. Examples include: the Payment Card Industry Data Security Standard (PCI DSS), Health Insurance Portability and Accountability Act (HIPAA), and Federal Energy Regulation Committee (FERC)
URI: https://libeldoc.bsuir.by/handle/123456789/31942
Appears in Collections:ТСЗИ 2018

Files in This Item:
File Description SizeFormat 
Joe-Madu_Implementation.pdf121.04 kBAdobe PDFView/Open
Show full item record Google Scholar

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.