[go: up one dir, main page]

LO GIUDICE, 2023 - Google Patents

Methodologies and tools for a vulnerability management process with an integrated risk evaluation framework

LO GIUDICE, 2023

View PDF
Document ID
8295608221980243746
Author
LO GIUDICE F
Publication year

External Links

Snippet

In recent decades, vulnerability management processes have gained prominence within corporate security strategies. Initially adopted by large tech organizations, these pro cesses have expanded across all industries, becoming a standard to ensure protection against ever …
Continue reading at www.politesi.polimi.it (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action

Similar Documents

Publication Publication Date Title
US12028380B2 (en) Systems and methods for network risk management, cyber risk management, security ratings, and evaluation systems and methods of the same
US8813235B2 (en) Expert system for detecting software security threats
US11895121B1 (en) Efficient identification and remediation of excessive privileges of identity and access management roles and policies
Muckin et al. A threat-driven approach to cyber security
Syed et al. Evaluating the effectiveness of cybersecurity protocols in SAP system upgrades
Huang et al. Utilizing prompt engineering to operationalize cybersecurity
Hughes et al. Effective vulnerability management: managing risk in the vulnerable digital ecosystem
Khan et al. 5G networks security mitigation model: An ANN-ISM hybrid approach
US20240420161A1 (en) Generative AI business insight report using LLMs
Ali et al. Backtrack 4: Assuring security by penetration testing
Sinan et al. Integrating Security Controls in DevSecOps: Challenges, Solutions, and Future Research Directions
Friman Agile and DevSecOps oriented vulnerability detection and mitigation on public cloud
Rahalkar Network Vulnerability Assessment: Identify security loopholes in your network’s infrastructure
LO GIUDICE Methodologies and tools for a vulnerability management process with an integrated risk evaluation framework
Alwaheidi A Data-Driven Threat Modelling Language for Ensuring Cyber Security Assurance
Edwards Critical Security Controls for Effective Cyber Defense
Buecker et al. IT Security Compliance Management Design Guide with IBM Tivoli Security Information and Event Manager
Ali et al. Assessing of software security reliability: Dimensional security assurance techniques
D'Onofrio et al. CI/CD Pipeline and DevSecOps Integration for Security and Load Testing
Erdıvan Process, Technology and Human Aspects of a Security Operations Center
Parvanov et al. Threat modelling and vulnerability assessment for IoT solutions: a case study
Girhotra et al. Securing Cloud-Native Applications (CNAs): A Case Study of Practices in a large IT Company
Shokunbi et al. Emerging Security Threat in the SOLC and Mitigations
Ahmed Security in Cloud-Native Applications with a Shift-Left Approach
Islam Architecture-centric support for security orchestration and automation