The Vulnerability Assessment & Mitigation Methodology
RAND NATIONAL DEFENSE RESEARCH INST SANTA MONICA CA
Pagination or Media Count:
As information systems become increasingly important to the functions of organizations, security and reliable operation of these systems are also becoming increasingly important. Interoperability, information sharing, collaboration, design imperfections, limitations, and the like lead to vulnerabilities that can endanger information system security and operation. Unfortunately, understanding an organizations reliance on information systems, the vulnerabilities of these systems, and how to mitigate the vulnerabilities has been a daunting challenge, especially for less wellknown or even unknown vulnerabilities that do not have a history of being exploited.
- Computer Systems Management and Standards