2005
DOI: 10.1201/1086.1065898x/45390.14.3.20050701/89149.6
|View full text |Cite
|
Sign up to set email alerts
|

Enterprise Vulnerability Management and Its Role in Information Security Management

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
14
0
1

Year Published

2008
2008
2020
2020

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 26 publications
(15 citation statements)
references
References 1 publication
0
14
0
1
Order By: Relevance
“…Beyond any doubt, the Vulnerability Management (VM), an essential part of maintaining the security of an organization [34,35], is threatened by growing cybercrime [36]. The identification and mitigation of vulnerabilities in specific or critical systems reduces the risk of exploitation impact during a potential attack [37].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Beyond any doubt, the Vulnerability Management (VM), an essential part of maintaining the security of an organization [34,35], is threatened by growing cybercrime [36]. The identification and mitigation of vulnerabilities in specific or critical systems reduces the risk of exploitation impact during a potential attack [37].…”
Section: Introductionmentioning
confidence: 99%
“…The VM process should be implemented practically in every organization that uses IT infrastructure. For instance, current corporate networks consist of thousands of devices and applications, without which business processes cannot function, whilst even a temporary unavailability of services rendered may result in large financial losses and reputation damage [35]. However, the critical importance of VM also applies to other entities ranging from office networks, to financial and personnel systems, to very specialized systems (e.g., industrial/process control, weapons, telecommunications, and environmental control systems) [38].…”
Section: Introductionmentioning
confidence: 99%
“…Organizations obtain benefits from protecting them. These benefits include enhancing organizations' reputation, increasing customer trust, and sustaining business resiliency (Opstal, 2007;Nyanchama, 2005). Conversely, failure to establish ISP can disrupt business operations and deteriorate organizational reputation and competitiveness as well as that of its customers (Fratto, 2009).…”
Section: Information Security Policy (Isp)mentioning
confidence: 99%
“…From the literature new threats to information systems occur from unexpected sources when organizations become more reliant on it (Nyanchama, 2005). "Threat is an indication of impending danger or harm" (Johnson, 2008).…”
Section: F Literature Reviewmentioning
confidence: 99%