首页> 美国政府科技报告 >Vulnerability Assessment & Mitigation Methodology
【24h】

Vulnerability Assessment & Mitigation Methodology

机译:漏洞评估和缓解方法

获取原文

摘要

As information systems become increasingly important to the functions of organizations, security and reliable operation of these systems are also becoming increasingly important. Interoperability, information sharing, collaboration, design imperfections, limitations, and the like lead to vulnerabilities that can endanger information system security and operation. Unfortunately, understanding an organization's reliance on information systems, the vulnerabilities of these systems, and how to mitigate the vulnerabilities has been a daunting challenge, especially for less wellknown or even unknown vulnerabilities that do not have a history of being exploited.

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号