Vulnerability Assessment - Information Assurance Tools Report

简介: This Report focuses on vulnerability assessment tools, which this Report defines as: automated ...
This Report focuses on vulnerability assessment tools, which this Report defines as: automated tools the primary purpose of which is to:  

- Proactively detect vulnerabilities in elements of deployable or deployed information systems and/or networks before those vulnerabilities are exploited (by contrast with tools that are used to forensically analyze such systems/networks after an intrusion or compromise);  

- Analyze all detected vulnerabilities to assess their potential impact on the security posture of the system/network element in which the vulnerabilities are found, and quantify the level of risk that impact poses on the overall system/network. 


Download PDF:  http://iac.dtic.mil
目录
相关文章
|
安全
Information Systems Security Assessment – Open information security framework
The Information Systems Security Assessment Framework (ISSAF) seeks to integrate the following m...
1008 0
PAT (Advanced Level) Practice:1~3题
​ ✨欢迎您的订阅✨ PAT乙级专栏(更新完毕): 👉🏻【Basic Level】👈🏻 PAT甲级专栏(更新ing): 👉🏻【Advanced Level】👈🏻 ​
|
CDN
Building an Industry Information Website
Object Storage Server (OSS) is a massive, secure, low-cost and highly reliable distributed storage service offered by Alibaba Cloud.
1587 0
Building an Industry Information Website
笔记:The Seven Steps to Building a Successful Software Development Company
笔记:The Seven Steps to Building a Successful Software Development Company 建立成功软件公司的七个步骤,感觉说的大都是常识,不过毕竟他整理出来了,看看也挺有意思的。
1552 0
|
SQL Web App开发
Root Cause Analysis and Countermeasures of Common Issues of Enterprise Websites
Let us start with this, have you ever received e-mails such as "notification for high-traffic customers," or "notification for high resource-consuming
1602 0
Predicting Malicious Behavior: Tools and Techniques for Ensuring Global Security
http://www.wiley.com/WileyCDA/WileyTitle/productCd-1118896696.
797 0
detecting apt activity with network traffic analysis
http://www.trendmicro.com/cloud-content/us/pdfs/security-intelligence/white-papers/wp-detecting-apt-activity-with-network-traffic-analysis.
877 0

热门文章

最新文章