首页> 外文会议>Proceedings of the 2018 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering >Aggregation process for implementation of application security management based on risk assessment
【24h】

Aggregation process for implementation of application security management based on risk assessment

机译:基于风险评估的应用程序安全管理实施的汇总过程

获取原文
获取原文并翻译 | 示例

摘要

This article is devoted to the review and analysis of existing methods of ensuring information security based on risk models. The strengths and weaknesses of the model are investigated on the basis of reliability theory. The article discusses potential obstacle to managing application security effectively and describes five steps for managing security. Create inventory of application and their attributes and evaluating their role in business impact (Create a profile for each application and conduction analysis of date processed in the application). Software vulnerability search (Static Analysis (“white-box”); Dynamic Analysis (“black-box”); Interactive Analysis (“glass-box”); Mobile Application Analysis); Risk assessment and prioritization of vulnerabilities (Setting priorities for applications; Setting priorities for types of vulnerabilities; Setting priorities for the development team; Changing vulnerability priorities and reassessing risks). Elimination of vulnerabilities and minimization of risks (security manager sets priorities and firmed tasks for the development team.
机译:本文致力于基于风险模型的现有信息安全保证方法的回顾和分析。基于可靠性理论,研究了模型的优缺点。本文讨论了有效管理应用程序安全性的潜在障碍,并介绍了管理安全性的五个步骤。创建应用程序及其属性的清单,并评估其在业务影响中的作用(为每个应用程序创建一个配置文件,并对应用程序中处理的日期进行进行分析)。软件漏洞搜索(静态分析(“白盒”);动态分析(“黑盒”);交互分析(“玻璃盒”);移动应用分析);风险评估和漏洞优先级(设置应用程序优先级;设置漏洞类型的优先级;为开发团队设置优先级;更改漏洞优先级并重新评估风险)。消除漏洞并最小化风险(安全经理为开发团队设置了优先级和确定的任务。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号