LO GIUDICE, 2023 - Google Patents
Methodologies and tools for a vulnerability management process with an integrated risk evaluation frameworkLO GIUDICE, 2023
View PDF- Document ID
- 8295608221980243746
- Author
- LO GIUDICE F
- Publication year
External Links
Snippet
In recent decades, vulnerability management processes have gained prominence within corporate security strategies. Initially adopted by large tech organizations, these pro cesses have expanded across all industries, becoming a standard to ensure protection against ever …
- 238000000034 method 0 title abstract description 190
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US12028380B2 (en) | Systems and methods for network risk management, cyber risk management, security ratings, and evaluation systems and methods of the same | |
US8813235B2 (en) | Expert system for detecting software security threats | |
US11895121B1 (en) | Efficient identification and remediation of excessive privileges of identity and access management roles and policies | |
Muckin et al. | A threat-driven approach to cyber security | |
Syed et al. | Evaluating the effectiveness of cybersecurity protocols in SAP system upgrades | |
Huang et al. | Utilizing prompt engineering to operationalize cybersecurity | |
Hughes et al. | Effective vulnerability management: managing risk in the vulnerable digital ecosystem | |
Khan et al. | 5G networks security mitigation model: An ANN-ISM hybrid approach | |
US20240420161A1 (en) | Generative AI business insight report using LLMs | |
Ali et al. | Backtrack 4: Assuring security by penetration testing | |
Sinan et al. | Integrating Security Controls in DevSecOps: Challenges, Solutions, and Future Research Directions | |
Friman | Agile and DevSecOps oriented vulnerability detection and mitigation on public cloud | |
Rahalkar | Network Vulnerability Assessment: Identify security loopholes in your network’s infrastructure | |
LO GIUDICE | Methodologies and tools for a vulnerability management process with an integrated risk evaluation framework | |
Alwaheidi | A Data-Driven Threat Modelling Language for Ensuring Cyber Security Assurance | |
Edwards | Critical Security Controls for Effective Cyber Defense | |
Buecker et al. | IT Security Compliance Management Design Guide with IBM Tivoli Security Information and Event Manager | |
Ali et al. | Assessing of software security reliability: Dimensional security assurance techniques | |
D'Onofrio et al. | CI/CD Pipeline and DevSecOps Integration for Security and Load Testing | |
Erdıvan | Process, Technology and Human Aspects of a Security Operations Center | |
Parvanov et al. | Threat modelling and vulnerability assessment for IoT solutions: a case study | |
Girhotra et al. | Securing Cloud-Native Applications (CNAs): A Case Study of Practices in a large IT Company | |
Shokunbi et al. | Emerging Security Threat in the SOLC and Mitigations | |
Ahmed | Security in Cloud-Native Applications with a Shift-Left Approach | |
Islam | Architecture-centric support for security orchestration and automation |