2015
DOI: 10.9708/jksci.2015.20.3.075
|View full text |Cite
|
Sign up to set email alerts
|

A Study on the Definition of Security Requirements of Vulnerability Management in Analysis Step

Abstract: Vulnerability management is in compliance with security policies, and then, this is to ensure the continuity and availability of the business . In this paper, the application vulnerability management and IT infrastructure of the system is that it must be identified. And a viable vulnerability management plan should be drawn from the development phase. There are many that are not defined vulnerability in the area of identification and authentication, encryption, access control in identification and classificati… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
0
0

Publication Types

Select...

Relationship

0
0

Authors

Journals

citations
Cited by 0 publications
references
References 2 publications
0
0
0
Order By: Relevance

No citations

Set email alert for when this publication receives citations?